Lucene search

K
wpvulndbFelipe Restrepo RodríguezWPVDB-ID:2AE5C375-A6A0-4C0B-A9EF-E4D2A28BCE5E
HistoryApr 19, 2023 - 12:00 a.m.

Bit Form < 1.9 - RCE via Unauthenticated Arbitrary File Upload

2023-04-1900:00:00
Felipe Restrepo Rodríguez
wpscan.com
11
bit form
remote code execution
unauthenticated upload
arbitrary files

0.016 Low

EPSS

Percentile

87.3%

The plugin does not validate the file types uploaded via it’s file upload form field, allowing unauthenticated users to upload arbitrary files types such as PHP or HTML files to the server, leading to Remote Code Execution.

PoC

As an unauthenticated user access a form containing a File Upload form. Upload a malicious html file (containing a malicious js for example) named after an image file, for example, and intercept the request. Change the filename’s extension in the request to html and forward the request. The malicious HTML will be available on the uploads directory.

CPENameOperatorVersion
bit-formlt1.9

0.016 Low

EPSS

Percentile

87.3%

Related for WPVDB-ID:2AE5C375-A6A0-4C0B-A9EF-E4D2A28BCE5E