Advisory:

Local File Include vulnerability in GD bbPress Attachments allows attackers to include arbitrary PHP files

Vulnerability

Last revised:

An attacker who is an admin can easily include any .php file on the server.

An attacker who can get an admin to follow a link they control will also be able to include that PHP file. It is easy to make these links very convincing.

They could exploit this to attempt to exhaust the server’s resources by including the file that includes the arbitrary file in an infinite loop.

If they’re additionally able to upload arbitrary PHP files (via an admin account or some other vulnerability) they’ll be able to run arbitrary code on the server.

 

Current state: Fixed

CVSS Summary

CVSS base scores for this vulnerability
Score 4.3 Medium
Vector Network
Complexity Medium
Authentication None
Confidentiality None
Integrity None
Availability Partial
You can read more about CVSS base scores on Wikipedia or in the CVSS specification.

Proof of concept

Visit this URL to cause an infinite loop:

http://localhost/wp-admin/edit.php?post_type=forum&page=gdbbpress_attachments&tab=../panels

Advisory timeline

  • 2015-02-25: Discovered
  • 2015-07-01: Reported to vendor via email form on https://www.dev4press.com/contact/
  • 2015-07-01: Requested CVE
  • 2015-07-01: Vendor responded
  • 2015-07-09: Vendor confirmed fix
  • 2015-07-09: Published

Mitigation/further actions

Upgrade to version 2.2 or later