{"id":4684,"date":"2024-09-06T21:25:16","date_gmt":"2024-09-06T21:25:16","guid":{"rendered":"http:\/\/127.0.0.1\/big-file-uploads-2-1-2-divulgacion-de-ruta-completa-full-path-disclosure-para-usuarios-autenticados-autor\/"},"modified":"2024-09-06T21:25:16","modified_gmt":"2024-09-06T21:25:16","slug":"big-file-uploads-2-1-2-divulgacion-de-ruta-completa-full-path-disclosure-para-usuarios-autenticados-autor","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/big-file-uploads-2-1-2-divulgacion-de-ruta-completa-full-path-disclosure-para-usuarios-autenticados-autor\/","title":{"rendered":"Big File Uploads <= 2.1.2 – Divulgaci\u00f3n de Ruta Completa (Full Path Disclosure) para Usuarios Autenticados (Autor+)"},"content":{"rendered":"
<\/p>\n
El plugin Big File Uploads – Increase Maximum File Upload Size para WordPress es vulnerable a la divulgaci\u00f3n de la ruta completa en todas las versiones hasta, e incluyendo, la 2.1.2. Esto se debe a que el plugin no sanitiza una ruta de archivo en un mensaje de error. Esto permite a atacantes autenticados, con […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2376],"class_list":["post-4684","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-8538"],"yoast_head":"\n