WordPress Is-Human Plugin - Remote Command Execution Vulnerability

is-human

Software
Is-Human
Versions
<= 1.4.2
Disclosure date
2011-05-17
CVE
CVE-N/A
References
Credits
Classification
Arbitrary Code Execution
OWASP Top 10

Are your websites subject to this vulnerability?

Details

The vulnerability exists in /is-human/engine.php. It takes control of the eval() function via the "type" parameter, when the "action" is set to log-reset.

Solution

Point the $is_hum->get_* array variable into $is_hum->get_ih and point it to php stored function error_log() if you want to close the execution without error.

Found a vulnerability that puts your sites at risk?

Found a vulnerability? Help us secure the web and join our community of ethical hackers.

Are you the developer of this software? Hire our researchers for a thorough security audit.