Description
WordPress Plugin A/B Test is prone to a directory traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin A/B Test version 1.0.6 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://packetstormsecurity.com/files/117353/WordPress-Abtest-Directory-Traversal.html
https://www.exploit-db.com/exploits/39577/
https://packetstormsecurity.com/files/136309/WordPress-Abtest-Local-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin XML Sitemap & Google News feeds Cross-Site Scripting (3.9)
WordPress Plugin Simple Ads Manager Local File Inclusion (2.10.0.130)
WordPress Plugin Content Staging Cross-Site Scripting (2.0.1)
WordPress Plugin Photo Gallery-Image Gallery by Ape Cross-Site Scripting (1.6.14)
WordPress Plugin Custom Post View Generator Cross-Site Scripting (0.4.6)