SB2019031802 - Local file inclusion in GraceMedia Media Player for WordPress



SB2019031802 - Local file inclusion in GraceMedia Media Player for WordPress

Published: March 18, 2019 Updated: March 18, 2019

Security Bulletin ID SB2019031802
Severity
High
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) PHP File inclusion (CVE-ID: N/A)

The vulnerability allows a remote attacker to include arbitrary file on the system.

The vulnerability exists due to input validation error when processing directory traversal sequences passed via the cfg HTTP GET parameter to "/wp-content/plugins/gracemedia-media-player/templates/files/ajax_controller.php" URL. A remote attacker can send a specially crafted HTTP request and read arbitrary files on the system or execute arbitrary PHP file.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.