Summary
The UnGallery plug-in for WordPress is prone to a local file- disclosure vulnerability because it fails to adequately validate user- supplied input.
Exploiting this vulnerability would allow an attacker to obtain potentially sensitive information from local files on computers running the vulnerable application. This may aid in further attacks.
UnGallery versions 1.5.8 and prior are vulnerable.
References
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- An Image Gallery Directory Traversal Vulnerability
- Apache Tomcat Login Constraints Security Bypass Vulnerability
- Adobe Presenter viewer.swf and loadflash.js XSS Vulnerability
- Apache ActiveMQ 'admin/queueBrowse' Cross Site Scripting Vulnerability
- Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities