Description
WordPress Plugin myFlash is prone to a remote file include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible. WordPress Plugin myFlash version 1.10 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.11 or latest
References
http://www.securityfocus.com/bid/23749/exploit
http://www.exploit-db.com/exploits/3828/
http://packetstormsecurity.com/files/view/56375/myflash-rfi.txt
Related Vulnerabilities
Liferay Portal Authorization Bypass Through User-Controlled Key Vulnerability (CVE-2022-42129)
WordPress Plugin Stripe Payments Cross-Site Scripting (2.0.39)
Ruby on Rails CVE-2021-22902 Vulnerability (CVE-2021-22902)
WordPress Plugin WP Add Mime Types Cross-Site Request Forgery (2.2.1)
WebLogic Deserialization of Untrusted Data Vulnerability (CVE-2019-16335)