标题: WordPress Front End Upload v0.5.4.4 Arbitrary PHP File Upload Vulnerability
作者: Chris Kellum
主页:
软件地址:
影响版本: 0.5.4.4
缺陷分析
=====================
Plugin does not properly filter filetypes, which allows for the upload of filetypes in the following format:
filename.php.jpg
Vulnerable hosts will serve such files as a php file, allowing for malicious files to be uploaded and executed.
In creating the uploads folder for this plugin, the code utilizes uniqid to add a unique string to the upload folder name in order to better hide it from direct access.
Example:
/wp-content/uploads/feu_9fc12558ac71e6995808cfc590207e87/
However, many WordPress installations allow direct access to the /wp-content/uploads/ folder, so simply look for a folder name beginning with 'feu_' to locate your upload.
,涛涛电脑知识网,涛涛电脑知识网