{"containers":{"cna":{"affected":[{"product":"SP Project & Document Manager","vendor":"Unknown","versions":[{"lessThan":"4.22","status":"affected","version":"4.22","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Viktor Markopoulos"}],"descriptions":[{"lang":"en","value":"The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from \"php\" to \"pHP\"."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-178","description":"CWE-178 Improper Handling of Case Sensitivity","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-08-01T12:45:43.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html"}],"source":{"discovery":"UNKNOWN"},"title":"SP Project & Document Manager <2 4.22 - Authenticated Shell Upload","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24347","STATE":"PUBLIC","TITLE":"SP Project & Document Manager <2 4.22 - Authenticated Shell Upload"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SP Project & Document Manager","version":{"version_data":[{"version_affected":"<","version_name":"4.22","version_value":"4.22"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Viktor Markopoulos"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from \"php\" to \"pHP\"."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-178 Improper Handling of Case Sensitivity"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a","refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a"},{"name":"http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html"},{"name":"http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:28:23.833Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24347","datePublished":"2021-06-14T13:37:12.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:28:23.833Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}