Vulnerability Description
The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset'. The root cause is unsafe use of eval() on user-controlled input, which can lead to execution of attacker-supplied PHP and OS commands. This may result in arbitrary code execution as the webserver user, site compromise, or data exfiltration. The is-human plugin was made defunct in June 2008 and is no longer available for download. This vulnerability was exploited in the wild in March 2012.
Related Weaknesses (CWE)
References
- https://web.archive.org/web/20120115212202/http://blog.spiderlabs.com/2012/01/ho
- https://wordpress.org/plugins/is-human/
- https://www.exploit-db.com/exploits/17299
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/honeypot-alert-m
- https://www.vulncheck.com/advisories/wordpress-plugin-is-human-eval-injection-rc
FAQ
What is CVE-2011-10033?
CVE-2011-10033 is a documented vulnerability. The WordPress plugin is-human <= v1.4.2 contains an eval injection vulnerability in /is-human/engine.php that can be triggered via the 'type' parameter when the 'action' parameter is set to 'log-reset...
How severe is CVE-2011-10033?
CVSS scoring is not yet available for CVE-2011-10033. Check NVD for updates.
Is there a patch for CVE-2011-10033?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.