vendor:
Brandfolder Plugin
by:
AMAR^SHG
8,8
CVSS
HIGH
Remote File Inclusion (RFI) & Local File Inclusion (LFI)
98
CWE
Product Name: Brandfolder Plugin
Affected Version From: <=3.0
Affected Version To: <=3.0
Patch Exists: YES
Related CWE: N/A
CPE: a:brandfolder:brandfolder_plugin
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: WAMP / Windows
2016
WordPress brandfolder plugin / RFI & LFI
The vulnerability occurs at the first lines of the file callback.php, where the user input is based on the $_REQUEST variable. An attacker can depending on the context, host on a malicious server a file called wp-load.php, and disable its execution using an htaccess, or abuse the null byte character ( %00, %2500 url-encoded).
Mitigation:
Ensure that user input is properly sanitized and validated before being used in the application.