Vulnerability CVE-2021-24171


Published: 2021-04-05

Description:
The WooCommerce Upload Files WordPress plugin before 59.4 ran a single sanitization pass to remove blocked extensions such as .php. It was possible to bypass this and upload a file with a PHP extension by embedding a "blocked" extension within another "blocked" extension in the "wcuf_file_name" parameter. It was also possible to perform a double extension attack and upload files to a different location via path traversal using the "wcuf_current_upload_session_id" parameter.

Type:

CWE-434

(Unrestricted Upload of File with Dangerous Type)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Woocommerce -> Upload files 

 References:
https://wpscan.com/vulnerability/ed4288a1-f7e4-455f-b765-5ac343f87194
https://www.wordfence.com/blog/2021/03/critical-vulnerability-patched-in-woocommerce-upload-files/

Copyright 2024, cxsecurity.com

 

Back to Top