Intrusion Prevention

WordPress.Pica.Photo.Gallery.Plugin.Arbitrary.File.Upload

Description

This indicates an attack attempt to exploit a Remote File Inclusion vulnerability in PICA Photo Gallery Plugin for WordPress.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling uploaded files. A remote attacker can exploit this to upload arbitrary files and by making a direct request to the file, also execute the script file uploaded.

Affected Products

Wordpress Pica Photo Gallery 1.0

Impact

System Compromise: Remote attackers can execute arbitrary script code in the context of the affected site.

Recommended Actions

Currently we are unaware of any vendor supplied patch or updates available for this issue.