Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-09-16T23:46:39.551Z

Reserved: 2009-11-05T00:00:00Z

Link: CVE-2009-3890

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2009-11-17T18:30:00.313

Modified: 2025-04-09T00:30:58.490

Link: CVE-2009-3890

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses