Wordpress Multiple Third Party Plugins Multiple Vulnerabilities


Description   (#Several vulnerabilities have been identified in third-party plugins for WordPress:#- Abtest: local file inclusion#- eBook Download: directory traversal allowing arbitrary file disclosure#- Import CSV: directory traversal allowing arbitrary file disclosure#- Dharma booking: remote and local file inclusion#- Memphis Document Library: arbitrary file download#- Brandfolder: remote and local file inclusion#- OptinMonster: arbitrary code execution#- HB Audio Gallery Lite: arbitrary file download#- Anti-Malware Security and Brute-Force Firewall: cross-site scripting and cross-site request forgery.##Proof of concepts are available.)
     
Vulnerable Products   Vulnerable Software:
WordPress (WordPress) -
     
Solution   - Anti-Malware Security and Brute-Force Firewall: 4.15.43
     
CVE  
     
References   - 0day.today : WordPress Abtest Local File Inclusion Vulnerability
http://0day.today/exploit/25095
- 0day.today : WordPress eBook Download Plugin 1.1 - Directory Traversal Vulnerability
http://0day.today/exploit/25094
- 0day.today : WordPress Import CSV Plugin 1.0 - Directory Traversal Vulnerability
http://0day.today/exploit/25093
- Exploit-DB : WordPress Dharma booking Plugin 2.38.3 - File Inclusion Vulnerability
https://www.exploit-db.com/exploits/39592/
- WExploit-DB : ordPress Memphis Document Library Plugin 3.1.5 - Arbitrary File Download
https://www.exploit-db.com/exploits/39593/
- Exploit-DB : WordPress Brandfolder Plugin 3.0 - RFI / LFI Vulnerability
https://www.exploit-db.com/exploits/39591/
- pritect : OptinMonster < 1.1.4.6 allows execution of arbitrary WordPress shortcodes
http://www.pritect.net/blog/optinmonster-1-1-4-6-security-vulnerability
- Exploit-DB : WordPress HB Audio Gallery Lite Plugin 1.0.0 - Arbitrary File Download
https://www.exploit-db.com/exploits/39589/
- WPVulnDB : Anti-Malware Security and Brute-Force Firewall <= 4.15.42 - XSS and CSRF
https://wpvulndb.com/vulnerabilities/8421
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
PHP : Remote file inclusion prevention : URL found as parameter
3.2.0
Directory traversal backward root folder
3.2.0
Misc : Local File Inclusion - suspicious /etc/passwd found in URL
3.5.0
PHP : RFI attack attempt on a vulnerable application
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2016-03-23 

 Target Type 
Server 

 Possible exploit 
Remote