Synopsis
The remote web server hosts a PHP script that can be abused to execute arbitrary code.
Description
The version of the is_human() plugin for WordPress installed on the remote host does not sanitize input to the 'type' parameter of the 'engine.php' script when 'action' is set to 'log-reset' before using it in an 'eval()' call.
An unauthenticated, remote attacker can leverage this issue to execute arbitrary PHP code on the affected host, subject to the privileges under which the web server runs.
Solution
Unknown at this time.
Plugin Details
File Name: ishuman_type_exec.nasl
Supported Sensors: Nessus
Enable CGI Scanning: true
Vulnerability Information
CPE: cpe:/a:wordpress:wordpress
Required KB Items: installed_sw/WordPress, www/PHP
Exploit Ease: Exploits are available
Exploited by Nessus: true
Vulnerability Publication Date: 5/17/2011
Reference Information
BID: 47883