WordPress A Page Flip Book Plugin for WordPress 'pageflipbook_language' Parameter Arbitrary Code Execution

critical Nessus Plugin ID 62414

Synopsis

The remote web server contains a PHP application that is affected by an arbitrary code execution vulnerability.

Description

The version of the 'A Page Flip Book' plugin for WordPress installed on the remote host is affected by an arbitrary code execution vulnerability due to a failure to properly sanitize user-supplied input to the 'pageflipbook_language' parameter in the pageflipbook.php script. An unauthenticated, remote attacker can exploit this issue to view arbitrary files or execute arbitrary PHP code on the remote host.

Note that successful exploitation of this issue has resulted in a persistent change to the site. To undo this change, reset the language option for the plugin in the WordPress admin panel.

Solution

Unknown at this time.

See Also

http://www.nessus.org/u?82cd92a6

Plugin Details

Severity: Critical

ID: 62414

File Name: wordpress_apageflipbook_lfi.nasl

Version: 1.12

Type: remote

Family: CGI abuses

Published: 10/3/2012

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Exploit Ease: No exploit is required

Exploited by Nessus: true

Vulnerability Publication Date: 7/10/2012

Exploitable With

Elliot (WordPress A Page Flip Book 2.3 LFI)

Reference Information

CVE: CVE-2012-6652

BID: 54368