Description
WordPress Plugin Slideshow Gallery LITE is prone to a vulnerability that lets attackers upload arbitrary files. The issue occurs because the application fails to adequately sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin Slideshow Gallery LITE version 1.4.6 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.4.7 or latest
References
http://whitexploit.blogspot.mx/2014/08/wordpress-slideshow-gallery-146-shell.html
http://www.exploit-db.com/exploits/34514/
http://www.exploit-db.com/exploits/34681/
http://packetstormsecurity.com/files/128069/WordPress-Slideshow-Gallery-1.4.6-Shell-Upload.html
Related Vulnerabilities
WebLogic Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-5397)
Grafana Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2022-23498)
MySQL CVE-2024-21130 Vulnerability (CVE-2024-21130)
Plone CMS Improper Restriction of XML External Entity Reference Vulnerability (CVE-2020-28734)
Drupal Resource Management Errors Vulnerability (CVE-2014-5265)