search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Imagely NextGen Gallery plugin for Wordpress contains a local file inclusion vulnerability

Vulnerability Note VU#346175

Original Release Date: 2016-11-16 | Last Revised: 2016-11-16

Overview

The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 may execute code from an uploaded malicious file.

Description

CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') - CVE-2016-6565

The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration).

Impact

An authenticated user may be able to read arbitrary files on the server or execute code on the server by including a malicious local file in a formatted server request.

Solution

Apply an update

Imagely has released the NextGen Gallery plugin version 2.1.57 to address this issue. Affected users are encouraged to upgrade to version 2.1.57 or later as soon as possible.

Vendor Information

346175
Expand all

Imagely

Notified:  October 12, 2016 Updated:  November 14, 2016

Statement Date:   October 26, 2016

Status

  Affected

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The patch for this issue was included with version 2.1.57.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base 9.0 AV:N/AC:L/Au:S/C:C/I:C/A:C
Temporal 7.0 E:POC/RL:OF/RC:C
Environmental 5.3 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Mukhammad Khalilov for reporting this vulnerability.

This document was written by Garret Wassermann.

Other Information

CVE IDs: CVE-2016-6565
Date Public: 2016-11-15
Date First Published: 2016-11-16
Date Last Updated: 2016-11-16 13:28 UTC
Document Revision: 24

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.