NONE · 0

CVE-2011-10033

The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset...

Vulnerability Description

The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012.

Related Weaknesses (CWE)

References

FAQ

What is CVE-2011-10033?

CVE-2011-10033 is a documented vulnerability. The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset...

How severe is CVE-2011-10033?

CVSS scoring is not yet available for CVE-2011-10033. Check NVD for updates.

Is there a patch for CVE-2011-10033?

Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.