NextGEN Gallery geo <= 1.0 - Unauthenticated PHP Object Injection

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The plugin nextgen-gallery-geo insecurely trusts serialized data submitted over AJAX requests. This opens up the site to a PHP object injection vulnerability potential exploit vector. 


The original researcher notified the WordPress Plugins team.
Proof of Concept
Attack is exploitable over AJAX calls sites with the nextgen-gallery-geo Plugin.

Affects Plugin

References

URL https://en-gb.wordpress.org/plugins/nextgen-gallery-geo/

Classification

Type UPLOAD
CWE CWE-434

Miscellaneous

Submitter Robert R
Submitter Website https://pagely.com
Submitter Twitter @iamlei
Views 115
Verified No
WPVDB ID 8826

Timeline

Publicly Published 2017-04-27 (6 months ago)
Added 2017-05-21 (5 months ago)
Last Updated 2017-05-21 (5 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.