Lucene search

K
wpexploitDo Xuan TrungWPEX-ID:421194E1-6C3F-4972-8F3C-DE1B9D2BCB13
HistorySep 19, 2023 - 12:00 a.m.

Weaver Xtreme Theme Support < 6.3.1 - Admin+ PHP Object Injection

2023-09-1900:00:00
Do Xuan Trung
31
weaver xtreme theme
version 6.3.1
admin+
php object injection
gadget chain
deserialization
security exploit

0.001 Low

EPSS

Percentile

19.4%

Description The plugin unserialises the content of an imported file, which could lead to PHP object injections issues when a high privilege user import a malicious file and a suitable gadget chain is present on the blog.

To simulate a gadget chain, put the following code in a plugin:

class Test {
  public function __wakeup() : void {
    die("Arbitrary deserialization");
  }
}

Create a file named "poc.txt" with the following content: O:4:"Test":0:{};

Upload the file via the "Choose File" feature in Weaver Xtreme Theme Support > Filters

Then choose Restore Filter Options.

The view the response of the request made, which will have the "Arbitrary deserialization" message.

0.001 Low

EPSS

Percentile

19.4%

Related for WPEX-ID:421194E1-6C3F-4972-8F3C-DE1B9D2BCB13