Description
WordPress Plugin NextGEN Gallery-WordPress Gallery is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin NextGEN Gallery-WordPress Gallery version 2.1.10 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.1.15 or latest
References
https://github.com/cybersecurityworks/Disclosed/issues/6
http://www.openwall.com/lists/oss-security/2015/10/27/6
https://packetstormsecurity.com/files/135061/WordPress-NextGEN-Gallery-2.1.10-Shell-Upload.html
Related Vulnerabilities
Django Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-2513)
PHP HTML entity encoder heap overflow vulnerability
MediaWiki Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2022-34750)
WordPress Plugin Photo Gallery, Images, Slider in Rbs Image Gallery Cross-Site Scripting (3.2.12)
WordPress Plugin Circles Gallery Cross-Site Scripting (1.0.10)