{"containers":{"cna":{"affected":[{"product":"Autoptimize","vendor":"Unknown","versions":[{"lessThan":"2.7.8","status":"affected","version":"2.7.8","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Marcin Węgłowski"}],"descriptions":[{"lang":"en","value":"The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on the disk but not yet removed. It is a bypass of CVE-2020-24948."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-362","description":"CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-06-21T19:18:23.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4"}],"source":{"discovery":"UNKNOWN"},"title":"Autoptimize < 2.7.8 - Race Condition leading to RCE","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24377","STATE":"PUBLIC","TITLE":"Autoptimize < 2.7.8 - Race Condition leading to RCE"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Autoptimize","version":{"version_data":[{"version_affected":"<","version_name":"2.7.8","version_value":"2.7.8"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"Marcin Węgłowski"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on the disk but not yet removed. It is a bypass of CVE-2020-24948."}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-362 Race Condition (Concurrent Execution using Shared Resource with Improper Synchronization)"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4","refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:28:23.923Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24377","datePublished":"2021-06-21T19:18:23.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:28:23.923Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}