← Voltar para CVEs
CVE-2023-4634
CRITICAL9.8
Descricao
The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.
Detalhes CVE
Pontuacao CVSS v3.19.8
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado9/6/2023
Ultima modificacao4/8/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
davidlingren:media_library_assistant
Fraquezas (CWE)
CWE-73
Referencias
https://github.com/Patrowl/CVE-2023-4634/(security@wordfence.com)
https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz(security@wordfence.com)
https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/(security@wordfence.com)
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2955933%40media-library-assistant&new=2955933%40media-library-assistant&sfp_email=&sfph_mail=#file4(security@wordfence.com)
https://www.wordfence.com/threat-intel/vulnerabilities/id/05c68377-feb6-442d-a3a0-1fbc246c7cbf?source=cve(security@wordfence.com)
https://github.com/Patrowl/CVE-2023-4634/(af854a3a-2127-422b-91ae-364da2661108)
https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz(af854a3a-2127-422b-91ae-364da2661108)
https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2955933%40media-library-assistant&new=2955933%40media-library-assistant&sfp_email=&sfph_mail=#file4(af854a3a-2127-422b-91ae-364da2661108)
https://www.wordfence.com/threat-intel/vulnerabilities/id/05c68377-feb6-442d-a3a0-1fbc246c7cbf?source=cve(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.