CVE-2014-8739

Scores

EPSS

0.916high91.6%
0%20%40%60%80%100%

Percentile: 91.6%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-434

Exploits

Exploit ID: 35057

Source: exploitdb

URL: https://www.exploit-db.com/exploits/35057

Exploit ID: 36811

Source: exploitdb

URL: https://www.exploit-db.com/exploits/36811

Vulnerable Software (2)

Type: Configuration

Vendor: *

Product: creative_contact_form

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:creative-solutions:creative_contact_form:*:*:*:*:*:wordpress:*:*",      "versionEndExcluding": "1.0.0",      "vulnerable": true    },    {   ...

Source: nvd

Type: Configuration

Vendor: *

Product: jquery_file_upload

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:creative-solutions:creative_contact_form:*:*:*:*:*:wordpress:*:*",      "versionEndExcluding": "1.0.0",      "vulnerable": true    },    {   ...

Source: nvd

End of list