WordPress MiwoFTP Plugin 1.0.5 Multiple CSRF XSS Vulnerabilities

2015-04-14T00:00:00
ID ZSL-2015-5241
Type zeroscience
Reporter Gjoko Krstic
Modified 2015-04-14T00:00:00

Description

Title: WordPress MiwoFTP Plugin 1.0.5 Multiple CSRF XSS Vulnerabilities
Advisory ID: ZSL-2015-5241
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 14.04.2015

Summary

MiwoFTP is a smart, fast and lightweight file manager plugin that operates from the back-end of WordPress.

Description

MiwoFTP WP Plugin suffers from multiple cross-site request forgery and xss vulnerabilities. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions with administrative privileges if a logged-in user visits a malicious web site. Input passed to several GET/POST parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Vendor

Miwisoft LLC - <http://www.miwisoft.com>

Affected Version

1.0.5

Tested On

Apache 2.4.10 (Win32)
PHP 5.6.3
MySQL 5.6.21

Vendor Status

[24.03.2015] Vulnerability discovered.
[25.03.2015] Vendor contacted.
[25.03.2015] Vendor responds asking more details.
[26.03.2015] Sent details to the vendor.
[27.03.2015] Vendor forwarded details to developers.
[30.03.2015] Vendor confirms vulnerability scheduling patch by end of week.
[31.03.2015] Replied to the vendor.
[09.04.2015] Asked vendor for status update.
[12.04.2015] No reply from the vendor.
[13.04.2015] Asked vendor for status update.
[13.04.2015] Vendor replies promising patch by end of week.
[14.04.2015] Vendor releases version 1.0.6 to address these issues.
[14.04.2015] Coordinated public security advisory released.

PoC

miwoftp_xss.txt

Credits

Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>

References

[1] <http://miwisoft.com/wordpress-plugins/miwoftp-wordpress-file-manager#changelog>
[2] <http://www.exploit-db.com/exploits/36762/>
[3] <http://cxsecurity.com/issue/WLB-2015040071>
[4] <http://packetstormsecurity.com/files/131435>
[5] <http://osvdb.org/show/osvdb/120798>
[6] <https://exchange.xforce.ibmcloud.com/vulnerabilities/102433>
[7] <https://exchange.xforce.ibmcloud.com/vulnerabilities/102434>

Changelog

[14.04.2015] - Initial release
[16.04.2015] - Added reference [2], [3], [4] and [5]
[22.04.2015] - Added reference [6] and [7]

Contact

Zero Science Lab

Web: <http://www.zeroscience.mk>
e-mail: lab@zeroscience.mk

                                        
                                            &lt;html&gt;&lt;head&gt;&lt;title&gt;403 Nothing to see.&lt;/title&gt;
&lt;link rel="Shortcut Icon" href="favicon.ico" type="image/x-icon"&gt;
&lt;style type="text/css"&gt;
&lt;!--
body {
	background-color: #000;
}
body,td,th {
	font-family: Verdana, Geneva, sans-serif;
}
a:link {
	color: #008FEF;
	text-decoration: none;
}
a:visited {
	color: #008FEF;
	text-decoration: none;
}
a:hover {
	text-decoration: underline;
	color: #666;
}
a:active {
	text-decoration: none;
}
--&gt;
&lt;/style&gt;
&lt;/head&gt;
&lt;body bgcolor=black&gt;
&lt;center&gt;
&lt;font color="#7E88A3" size="2"&gt;
&lt;br /&gt;&lt;br /&gt;
&lt;h1&gt;403 Nothing to see.&lt;/h1&gt;

You do not have the powah for this request /403.shtml&lt;br /&gt;&lt;br /&gt;
&lt;font size="2"&gt;&lt;a href="https://www.zeroscience.mk"&gt;https://www.zeroscience.mk&lt;/a&gt;&lt;/font&gt;
&lt;/font&gt;&lt;/center&gt;
&lt;/body&gt;&lt;/html&gt;