Lucene search

K
wpvulndbRaad Haddad of Cloudyrion GmbHWPVDB-ID:D3D9DC9A-226B-4F76-995E-E2AF1DD6B17E
HistorySep 07, 2022 - 12:00 a.m.

Frontend File Manager < 21.3 - Subscriber+ Arbitrary File Upload

2022-09-0700:00:00
Raad Haddad of Cloudyrion GmbH
wpscan.com
17
file manager
arbitrary upload
rce
subscriber
security vulnerability

EPSS

0.001

Percentile

42.9%

The plugin allows any authenticated users, such as subscriber, to rename a file to an arbitrary extension, like PHP, which could allow them to basically be able to upload arbitrary files on the server and achieve RCE

PoC

1. Navigate to the page where [ffmwp] shortcode is included as Subscriber 2. Upload the malicious PHP file as PDF file (e.g., exploit.pdf) 3. View the file and rename it from exploit.pdf to exploit.php The file will be accessible via https://example.com/wp-content/uploads/user_uploads//exploit.php

EPSS

0.001

Percentile

42.9%

Related for WPVDB-ID:D3D9DC9A-226B-4F76-995E-E2AF1DD6B17E