Lucene search

K
wpvulndbApple502jWPVDB-ID:1ADA2A96-32AA-4E37-809C-705DB6026E0B
HistoryAug 23, 2021 - 12:00 a.m.

OMGF < 4.5.4 - Subscriber+ Arbitrary File/Folder Deletion

2021-08-2300:00:00
apple502j
wpscan.com
12
omgf 4.5.4 vulnerability
subscriber role
arbitrary file deletion
arbitrary folder deletion
path validation
authorization
csrf checks

EPSS

0.001

Percentile

25.1%

The plugin does not enforce path validation, authorisation and CSRF checks in the omgf_ajax_empty_dir AJAX action, which allows any authenticated users to delete arbitrary files or folders on the server.

PoC

As an authenticated user, with a role as low as subscriber, viewing the admin the dashboard (/wp-admin/index.php), run the below command in the Web Developer console of the web browser. This will delete /wp-content/index.php file (“silence is golden”). You can also do /…/…/…/** or /…/…/…/wp-admin/ or… (assuming you want to destroy the installation). jQuery.post(ajaxurl,{action:“omgf_ajax_empty_dir”,section:“/…/…/index.php”})

EPSS

0.001

Percentile

25.1%

Related for WPVDB-ID:1ADA2A96-32AA-4E37-809C-705DB6026E0B