WordPress up to 3.3.2 Media Attachment media-upload.php post_id access control
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.2 | $0-$5k | 0.00 |
Summary
A vulnerability described as critical has been identified in WordPress up to 3.3.2. This affects an unknown part of the file wp-admin/media-upload.php of the component Media Attachment Handler. Such manipulation of the argument post_id leads to access control. This vulnerability is referenced as CVE-2012-6634. No exploit is available. Upgrading the affected component is recommended.
Details
A vulnerability, which was classified as critical, has been found in WordPress up to 3.3.2 (Content Management System). Affected by this issue is an unknown code block of the file wp-admin/media-upload.php of the component Media Attachment Handler. The manipulation of the argument post_id with an unknown input leads to a access control vulnerability. Using CWE to declare the problem leads to CWE-264. Impacted is confidentiality, and integrity. CVE summarizes:
wp-admin/media-upload.php in WordPress before 3.3.3 allows remote attackers to obtain sensitive information or bypass intended media-attachment restrictions via a post_id value.
The weakness was published 06/15/2012 as Version 3.3.3 as confirmed release notes (Website). The advisory is shared for download at codex.wordpress.org. This vulnerability is handled as CVE-2012-6634 since 01/20/2014. The attack may be launched remotely. The requirement for exploitation is a simple authentication. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1068.
By approaching the search of inurl:wp-admin/media-upload.php it is possible to find vulnerable targets with Google Hacking. The vulnerability scanner Nessus provides a plugin with the ID 72984 (WordPress < 3.3.3 / 3.4.0 Multiple Vulnerabilities), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CGI abuses.
Upgrading to version 3.3.3 eliminates this vulnerability. The upgrade is hosted for download at core.trac.wordpress.org. A possible mitigation has been published immediately after the disclosure of the vulnerability. The vulnerability will be addressed with the following lines of code:
if ( ! empty( $_REQUEST['post_id'] ) && ! current_user_can( 'edit_post' , $_REQUEST['post_id'] ) ) wp_die( __( 'Cheatin’ uh?' ) );
The vulnerability is also documented in the databases at Tenable (72984), OSVDB (102546†) and Vulnerability Center (SBV-43636†). Similar entries are available at VDB-12081 and VDB-66134. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Name
Version
License
Website
- Product: https://wordpress.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.4VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.4
VulDB Temp Score: 5.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-264
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
Google Hack: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 72984
Nessus Name: WordPress < 3.3.3 / 3.4.0 Multiple Vulnerabilities
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: WordPress 3.3.3
Timeline
01/27/2012 🔍06/15/2012 🔍
06/15/2012 🔍
01/20/2014 🔍
01/20/2014 🔍
01/28/2014 🔍
03/16/2014 🔍
06/08/2021 🔍
Sources
Product: wordpress.comAdvisory: Version 3.3.3
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2012-6634 (🔍)
GCVE (CVE): GCVE-0-2012-6634
GCVE (VulDB): GCVE-100-12080
OSVDB: 102546
Vulnerability Center: 43636 - WordPress before 3.3.3 Remote Security Bypass and Leakage of Information Vulnerability, Medium
See also: 🔍
Entry
Created: 01/28/2014 10:54Updated: 06/08/2021 17:46
Changes: 01/28/2014 10:54 (68), 05/23/2017 08:44 (1), 06/08/2021 17:46 (3)
Complete: 🔍
Cache ID: 216:9D7:103
No comments yet. Languages: en.
Please log in to comment.