Description
WordPress Plugin ReFlex Gallery is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin ReFlex Gallery version 3.1.3 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.1.4 or latest
References
http://www.exploit-db.com/exploits/36374/
http://packetstormsecurity.com/files/130845/WordPress-Reflex-Gallery-3.1.3-Shell-Upload.html
https://github.com/googleinurl/Wordpress-Plugin-Reflex-Gallery-Arbitrary-File-Upload
http://packetstormsecurity.com/files/131515/WordPress-Reflex-Gallery-Upload.html
Related Vulnerabilities
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-15099)
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-7572)
WordPress Plugin Wordfence Security-Firewall & Malware Scan Cross-Site Scripting (5.1.2)
Liferay Portal Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2021-33320)
WordPress Plugin verwei.se-WordPress-Twitter Cross-Site Scripting (1.0.2)