Vulnerability Description
cloner.functions.php in the XCloner plugin 3.1.2 for WordPress allows remote authenticated users to execute arbitrary commands via a file containing filenames with shell metacharacters, as demonstrated by using the backup comments feature to create the file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xcloner | Xcloner | 3.1.2 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Exploit
- http://www.securityfocus.com/bid/74943
- http://www.vapid.dhs.org/advisory.php?v=121Exploit
- http://packetstormsecurity.com/files/132107/WordPress-XCloner-3.1.2-XSS-Command-Exploit
- http://www.securityfocus.com/bid/74943
- http://www.vapid.dhs.org/advisory.php?v=121Exploit
FAQ
What is CVE-2015-4336?
CVE-2015-4336 is a vulnerability with a CVSS score of 6.5 (MEDIUM). cloner.functions.php in the XCloner plugin 3.1.2 for WordPress allows remote authenticated users to execute arbitrary commands via a file containing filenames with shell metacharacters, as demonstrate...
How severe is CVE-2015-4336?
CVE-2015-4336 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-4336?
Check the references section above for vendor advisories and patch information. Affected products include: Xcloner Xcloner.