{"vuid":"VU#346175","idnumber":"346175","name":"Imagely NextGen Gallery plugin for Wordpress contains a local file inclusion vulnerability","keywords":["lfi","CWE-98","wordpress"],"overview":"The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 may execute code from an uploaded malicious file.","clean_desc":"CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') - CVE-2016-6565 The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration).","impact":"An authenticated user may be able to read arbitrary files on the server or execute code on the server by including a malicious local file in a formatted server request.","resolution":"Apply an update Imagely has released the NextGen Gallery plugin version 2.1.57 to address this issue. Affected users are encouraged to upgrade to version 2.1.57 or later as soon as possible.","workarounds":"","sysaffected":"","thanks":"Thanks to \nMukhammad Khalilov\n for reporting this vulnerability.","author":"This document was written by Garret Wassermann.","public":["https://wordpress.org/plugins/nextgen-gallery/","http://cwe.mitre.org/data/definitions/98.html"],"cveids":["CVE-2016-6565"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2016-10-12T20:00:19Z","publicdate":"2016-11-15T00:00:00Z","datefirstpublished":"2016-11-16T13:28:50Z","dateupdated":"2016-11-16T13:28:53Z","revision":25,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"9","cvss_basevector":"AV:N/AC:L/Au:S/C:C/I:C/A:C","cvss_temporalscore":"7","cvss_environmentalscore":"5.3044065648","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}