We are requesting CVE for the below mentioned security issue in NextGen
Plugin Name: NextGen Gallery
NextGEN Gallery is most popular *WordPress Gallery Plugin *with over 13 millions downloads.
The plugin fails to validate user input in one of the variables, which allows a log-in user to access system files and other unauthorized files on the server.
POC Video Link: https://www.youtube.com/watch?v=KkPVMxubUis
Proof of Concept
Accessing the POST request http://localhost/wordpress/?photocrati_ajax=1
and modifying the *dir* variable with ../../../ input user can traverse
file system and access files even outside the application directory.
17-02-2015: Reported to WP Plugins
18-02-2015: Acknowledged by WP Plugin, saying that vendor will be informed.
But till now no response from WP plugin or vendor.
Discovered by ( Please provide credit to following)
Cyber Security Works Pvt Ltd.