Vigil@nce - WordPress Contact Form 7: PHP code execution
December 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can upload a PHP file via WordPress Contact Form 7, in
order to execute PHP code.
Impacted products: WordPress Plugins
Severity: 2/4
Creation date: 25/11/2013
DESCRIPTION OF THE VULNERABILITY
The Contact Form 7 plugin provides a contact form for WordPress.
It can be used to upload a file. However, a PHP file can be
uploaded on the server, and then executed.
An attacker can therefore upload a PHP file via WordPress Contact
Form 7, in order to execute PHP code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WordPress-Contact-Form-7-PHP-code-execution-13819