First published: Fri Mar 05 2010(Updated: )
Directory traversal vulnerability in main.php in the WP-Lytebox plugin 1.3 for WordPress allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the pg parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Grupenet Wp-lytebox | =1.3 | |
WordPress | ||
All of | ||
Grupenet Wp-lytebox | =1.3 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4672 has a moderate severity level due to its potential to allow remote code execution.
To fix CVE-2009-4672, update the WP-Lytebox plugin to the latest version or remove the plugin entirely.
The attack vector for CVE-2009-4672 involves exploiting directory traversal through the 'pg' parameter to include arbitrary local files.
CVE-2009-4672 affects users of the WP-Lytebox plugin version 1.3 for WordPress.
Yes, CVE-2009-4672 can potentially lead to data breaches by allowing attackers to execute arbitrary code on the server.