Vulnerabilities > CVE-2015-1172 - Unspecified vulnerability in Holding Pattern Project Holding Pattern 0.6

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
holding-pattern-project
exploit available
metasploit

Summary

Unrestricted file upload vulnerability in admin/upload-file.php in the Holding Pattern theme (aka holding_pattern) 0.6 and earlier for WordPress allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in an unspecified directory.

Vulnerable Configurations

Part Description Count
Application
Holding_Pattern_Project
1

D2sec

nameWordPress Holding Pattern Theme 0.6 File Upload
urlhttp://www.d2sec.com/exploits/wordpress_holding_pattern_theme_0.6_file_upload.html

Exploit-Db

descriptionWordPress Theme Holding Pattern - Arbitrary File Upload (Metasploit). CVE-2015-1172. Webapps exploit for Linux platform
idEDB-ID:41698
last seen2017-03-23
modified2017-03-23
published2017-03-23
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/41698/
titleWordPress Theme Holding Pattern - Arbitrary File Upload (Metasploit)

Metasploit

descriptionThis module exploits a file upload vulnerability in all versions of the Holding Pattern theme found in the upload_file.php script which contains no session or file validation. It allows unauthenticated users to upload files of any type and subsequently execute PHP scripts in the context of the web server.
idMSF:EXPLOIT/UNIX/WEBAPP/WP_HOLDING_PATTERN_FILE_UPLOAD
last seen2020-06-01
modified2018-10-01
published2015-02-14
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1172
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/wp_holding_pattern_file_upload.rb
titleWordPress Holding Pattern Theme Arbitrary File Upload

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/130460/wp_holding_pattern_file_upload.rb.txt
idPACKETSTORM:130460
last seen2016-12-05
published2015-02-24
reporterAlexander Borg
sourcehttps://packetstormsecurity.com/files/130460/WordPress-Holding-Pattern-Theme-Arbitrary-File-Upload.html
titleWordPress Holding Pattern Theme Arbitrary File Upload