Vigil@nce - WordPress File Gallery: code execution
May 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker, who is administrator in a jailed environment, can use
WordPress File Gallery, in order to execute PHP code.
Impacted products: WordPress Plugins
Severity: 1/4
Creation date: 07/05/2014
DESCRIPTION OF THE VULNERABILITY
The File Gallery plugin can be installed on WordPress.
However, an attacker can call create_function(), in order to
create PHP code.
An attacker, who is administrator in a jailed environment, can
therefore use WordPress File Gallery, in order to execute PHP code.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WordPress-File-Gallery-code-execution-14708