{"id":4293,"date":"2024-07-15T20:45:24","date_gmt":"2024-07-15T20:45:24","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-travesia-de-directorio-en-wordpress-file-upload-4-24-7-authenticated-contributor\/"},"modified":"2024-07-15T20:45:24","modified_gmt":"2024-07-15T20:45:24","slug":"vulnerabilidad-de-travesia-de-directorio-en-wordpress-file-upload-4-24-7-authenticated-contributor","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-travesia-de-directorio-en-wordpress-file-upload-4-24-7-authenticated-contributor\/","title":{"rendered":"Vulnerabilidad de Traves\u00eda de Directorio en WordPress File Upload <= 4.24.7 – Authenticated (Contributor+)"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad CVE-2024-5852, tambi\u00e9n conocida como ‘Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’)’, afecta al plugin WordPress File Upload en versiones hasta la 4.24.7. Esta vulnerabilidad permite a atacantes autenticados con nivel de acceso Contributor y superior, cargar archivos en ubicaciones arbitrarias en el servidor web. La vulnerabilidad se encuentra en […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2001],"class_list":["post-4293","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-5852"],"yoast_head":"\n