Description
WordPress Plugin Downloads Manager is prone to a vulnerability that lets attackers upload and execute arbitrary code. This issue occurs because the application fails to sufficiently sanitize user-supplied input. Successfully exploiting this issue will allow attackers to upload and execute arbitrary PHP code within the context of the webserver process. This may allow an attacker to compromise the application and the underlying system; other attacks are also possible. WordPress Plugin Downloads Manager version 0.2 is vulnerable; other versions may also be affected.
Remediation
Update to the latest version
References
http://www.securityfocus.com/bid/30365/exploit
http://www.exploit-db.com/exploits/6127/
http://packetstormsecurity.com/files/view/68478/wordpressdm-upload.txt
Related Vulnerabilities
WordPress Plugin Calendar Event Multi View Security Bypass (1.4.13)
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-3665)
WordPress Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2014-9033)
WordPress Plugin LazyEater Multiple Unspecified Vulnerabilities (1.2.4)
Oracle Database Server CVE-2012-0527 Vulnerability (CVE-2012-0527)