vendor:
Livesig
by:
Ben Schmidt
8.8
CVSS
HIGH
Remote File Inclusion (RFI)
98
CWE
Product Name: Livesig
Affected Version From: 0.4
Affected Version To: 0.4
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:livesig
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
Livesig WordPress plugin RFI
The Livesig Wordpress plugin is vulnerable to a Remote File Inclusion (RFI) attack. An attacker can send a malicious POST request to the livesig-ajax-backend.php file, which includes the 'wp-root' parameter. This parameter is used to include a remote file, which can be used to execute arbitrary code on the server.
Mitigation:
Ensure that user input is properly sanitized and validated before being used to include files.