Vulnerabilities > CVE-2015-1172 - Arbitrary File Upload vulnerability in Holding Pattern Project Holding Pattern 0.6

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
holding-pattern-project
exploit available
metasploit

Summary

Unrestricted file upload vulnerability in admin/upload-file.php in the Holding Pattern theme (aka holding_pattern) 0.6 and earlier for WordPress allows remote attackers to execute arbitrary PHP code by uploading a file with a PHP extension, then accessing it via a direct request to the file in an unspecified directory. <a href="http://cwe.mitre.org/data/definitions/434.html">CWE-434: Unrestricted Upload of File with Dangerous Type</a>

Vulnerable Configurations

Part Description Count
Application
Holding_Pattern_Project
1

D2sec

nameWordPress Holding Pattern Theme 0.6 File Upload
urlhttp://www.d2sec.com/exploits/wordpress_holding_pattern_theme_0.6_file_upload.html

Exploit-Db

descriptionWordPress Theme Holding Pattern - Arbitrary File Upload (Metasploit). CVE-2015-1172. Webapps exploit for Linux platform
idEDB-ID:41698
last seen2017-03-23
modified2017-03-23
published2017-03-23
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/41698/
titleWordPress Theme Holding Pattern - Arbitrary File Upload (Metasploit)

Metasploit

descriptionThis module exploits a file upload vulnerability in all versions of the Holding Pattern theme found in the upload_file.php script which contains no session or file validation. It allows unauthenticated users to upload files of any type and subsequently execute PHP scripts in the context of the web server.
idMSF:EXPLOIT/UNIX/WEBAPP/WP_HOLDING_PATTERN_FILE_UPLOAD
last seen2020-06-01
modified2018-10-01
published2015-02-14
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1172
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/wp_holding_pattern_file_upload.rb
titleWordPress Holding Pattern Theme Arbitrary File Upload

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/130460/wp_holding_pattern_file_upload.rb.txt
idPACKETSTORM:130460
last seen2016-12-05
published2015-02-24
reporterAlexander Borg
sourcehttps://packetstormsecurity.com/files/130460/WordPress-Holding-Pattern-Theme-Arbitrary-File-Upload.html
titleWordPress Holding Pattern Theme Arbitrary File Upload