Description
WordPress Plugin A/B Test is prone to a directory traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin A/B Test version 1.0.6 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://packetstormsecurity.com/files/117353/WordPress-Abtest-Directory-Traversal.html
https://www.exploit-db.com/exploits/39577/
https://packetstormsecurity.com/files/136309/WordPress-Abtest-Local-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin Music Store Open Redirect (1.0.14)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-3387)
Microsoft SQL Server Other Vulnerability (CVE-2000-0603)
WordPress Plugin Falang multilanguage for WordPress Cross-Site Scripting (1.3.17)
Apache Denial of service in mod_lua r:parsebody Vulnerability (CVE-2022-29404)