Lucene search

K
wpvulndbDmitrii IgnatyevWPVDB-ID:ECCD017C-E442-46B6-B5E6-AEC7BBD5F836
HistoryMay 14, 2024 - 12:00 a.m.

Insert or Embed Articulate Content into WordPress <= 4.3000000023 - Author+ Upload to RCE

2024-05-1400:00:00
Dmitrii Ignatyev
wpscan.com
10
wordpress
insert
embed
vulnerability
rce
articulate content
zip files
malicious code
server

AI Score

6.5

Confidence

High

EPSS

0

Percentile

9.0%

Description The plugin is not properly filtering which file extensions are allowed to be imported on the server, allowing the uploading of malicious code within zip files

PoC

Note: This must be tested on a web server running Apache 1) Create a new post 2) Add e-Learning block to the post and upload a zip file containing a blank HTML file (e.g. main.html) and a Phar filed with the name cmd.phar). In cmd.phar, add the contents ``. Malicious .htaccess files works too. 3) After uploading, browse to http://example.com//wp-content/uploads/articulate_uploads/__ZIP_NAME_HERE__/cmd.phar?cmd=ls 4) You will see a listing of contents using the ls command

AI Score

6.5

Confidence

High

EPSS

0

Percentile

9.0%

Related for WPVDB-ID:ECCD017C-E442-46B6-B5E6-AEC7BBD5F836