Lucene search

K
wpexploitJonatas Souza Villa FlorWPEX-ID:1AB192D7-72AC-4F12-8A51-F28EE4DB91BC
HistoryAug 17, 2023 - 12:00 a.m.

wpDataTables < 2.1.66 - Admin+ PHP Object Injection

2023-08-1700:00:00
Jonatas Souza Villa Flor
43
wpdatatables
vulnerability
php object injection
admin panel

AI Score

8.2

Confidence

Low

EPSS

0.002

Percentile

61.1%

Description The plugin does not validate the “Serialized PHP array” input data before deserializing the data. This allows admins to deserialize arbitrary data which may lead to remote code execution if a suitable gadget chain is present on the server. This is impactful in environments where admin users should not be allowed to execute arbitrary code, such as multisite.

1. Include the following PHP code on your site to simulate a Gadget.

class Evil {
 function __wakeup() {
  die('Arbitrary deserialization');
 }
}

2. Host the following payload at a publicly accessible URL (e.g. pastebin).

O:4:"Evil":0:{};

3. In WP Admin, visit wpDataTables > Create a Table.

4. Click "Create a data table linked to an existing data source." and click "Next"

5. In "Input data source type" choose "Serialized PHP array", and in "Input file path or URL" choose the URL from step 2.

6. Click "Save Changes" and see the Arbitrary Deserialization message.

AI Score

8.2

Confidence

Low

EPSS

0.002

Percentile

61.1%

Related for WPEX-ID:1AB192D7-72AC-4F12-8A51-F28EE4DB91BC