WordPress 1 Flash Gallery Plugin Arbitrary File Upload Vulnerability


Description   supernothing has discovered a vulnerability in 1 Flash Gallery plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is caused due to the wp-content/plugins/1-flash-gallery/upload.php script (when "action" is set to "uploadify" and "fileext" is set to e.g. "php") improperly verifying uploaded files. This can be exploited to execute arbitrary PHP code by uploading a PHP file.
The vulnerability is confirmed in version 1.5.6. Prior versions may also be affected.
     
Vulnerable Products   Vulnerable Software:
WordPress 1 Flash Gallery Plugin 1.x
     
Solution   Update to version 1.5.8.
     
CVE  
     
References   supernothing:
http://spareclockcycles.org/2011/09/06/flash-gallery-arbitrary-file-upload/
1 Flash Gallery Changelog:
http://wordpress.org/extend/plugins/1-flash-gallery/changelog/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
PHP : Remote file inclusion prevention : suspicious root_path parameter found in URL
3.2.0
PHP : Remote file inclusion prevention : URL found as parameter
3.2.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2011-09-08 

 Target Type 
Server 

 Possible exploit 
Remote