Peepso plugin allow remote execution code, authors have been noticed about.
Peepso security bug
SEVERITY: HIGH SEVERITY
Allow arbitrary remote execution code:
File:
wp-content/plugins/peepso-core/templates/register/register-activate.php
Vulnerable code:
Code: Select all
<div class="ps-form-field">
<?php
$value = '';
if (isset($_GET['peepso_activation_code'])){
$value = $_GET['peepso_activation_code'];
}
?>
<input type="text" name="activate" class="ps-input" value="<?php echo $value; ?>" placeholder="<?php _e('Activation code', 'peepso'); ?>" />
Security patch example:
Code: Select all
<?php
if (isset($_GET['peepso_activation_code'])) {
$value = trim(utf8_encode($_GET['peepso_activation_code']));
if(preg_match('/[^0-9A-Za-z]/',$value)){
die('Unwanted chars detected.');
}
}
?>