Lucene search

K
wpvulndbEthicalhack3rWPVDB-ID:E8C87C22-4FEB-4A16-845A-43806453E869
HistoryApr 20, 2017 - 12:00 a.m.

WooCommerce Catalog Enquiry - Arbitrary File Upload

2017-04-2000:00:00
ethicalhack3r
wpscan.com
8

0.001 Low

EPSS

Percentile

31.9%

Email from user: “A ‘fix’ for the file upload vulnerability seems to have been introduced in version 3.0.2 with the cryptic description “Fixed some data issues.” However I hope you’re aware that the vulnerability still exists and can be exploited by simply changing Content-Type in the HTTP request. You’re trusting the client to be honest about Content-Type when you check “type” from $_FILES. The very first comment at http://php.net/manual/en/reserved.variables.files.php warns about this.” Additional notes: File is uploaded to the ‘/wp-content/uploads/catalog_enquiry/’ directory. Content type of “image/png” works.

CPENameOperatorVersion
woocommerce-catalog-enquirylt3.1.0

0.001 Low

EPSS

Percentile

31.9%

Related for WPVDB-ID:E8C87C22-4FEB-4A16-845A-43806453E869