WordPress eShop 6.3.11 Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 6 May 2015.

  1. Packet Storm

    Packet Storm Guest

    High-Tech Bridge Security Research Lab discovered a security vulnerability in the eShop WordPress Plugin, which can be exploited by remote attackers to overwrite arbitrary PHP variables within the context of the vulnerable application. The vulnerability exists due to insufficient validation of user-supplied input in the "eshopcart" HTTP cookie. Successful exploitation of this vulnerability may potentially result in arbitrary PHP code execution.

    Continue reading...
     

Share This Page

Loading...