Executive Summary

Summary
Title Imagely NextGen Gallery plugin for Wordpress contains a local file inclusion vulnerability
Informations
Name VU#346175 First vendor Publication 2016-11-16
Vendor VU-CERT Last vendor Modification 2016-11-16
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:P/I:P/A:P)
Cvss Base Score 6 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 6.8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Vulnerability Note VU#346175

Imagely NextGen Gallery plugin for Wordpress contains a local file inclusion vulnerability

Original Release date: 16 Nov 2016 | Last revised: 16 Nov 2016

Overview

The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 may execute code from an uploaded malicious file.

Description

CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') - CVE-2016-6565

The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration).

Impact

An authenticated user may be able to read arbitrary files on the server or execute code on the server by including a malicious local file in a formatted server request.

Solution

Apply an update

Imagely has released the NextGen Gallery plugin version 2.1.57 to address this issue. Affected users are encouraged to upgrade to version 2.1.57 or later as soon as possible.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
ImagelyAffected12 Oct 201614 Nov 2016
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

GroupScoreVector
Base9.0AV:N/AC:L/Au:S/C:C/I:C/A:C
Temporal7.0E:POC/RL:OF/RC:C
Environmental5.3CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

  • https://wordpress.org/plugins/nextgen-gallery/
  • http://cwe.mitre.org/data/definitions/98.html

Credit

Thanks to Mukhammad Khalilov for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

  • CVE IDs:CVE-2016-6565
  • Date Public:15 Nov 2016
  • Date First Published:16 Nov 2016
  • Date Last Updated:16 Nov 2016
  • Document Revision:24

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/346175

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 73

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2018-09-08 00:21:46
  • Multiple Updates
2018-07-14 00:21:04
  • Multiple Updates
2016-11-16 17:22:58
  • First insertion