WordPress MiwoFTP Plugin 1.0.5 CSRF Arbitrary File Creation Exploit (RCE)
Title: WordPress MiwoFTP Plugin 1.0.5 CSRF Arbitrary File Creation Exploit (RCE)
Advisory ID: ZSL-2015-5242
Type: Local/Remote
Impact: Cross-Site Scripting, System Access
Risk: (4/5)
Release Date: 14.04.2015
PHP 5.6.3
MySQL 5.6.21
[25.03.2015] Vendor contacted.
[25.03.2015] Vendor responds asking more details.
[26.03.2015] Sent details to the vendor.
[27.03.2015] Vendor forwarded details to developers.
[30.03.2015] Vendor confirms vulnerability scheduling patch by end of week.
[31.03.2015] Replied to the vendor.
[09.04.2015] Asked vendor for status update.
[12.04.2015] No reply from the vendor.
[13.04.2015] Asked vendor for status update.
[13.04.2015] Vendor replies promising patch by end of week.
[14.04.2015] Vendor releases version 1.0.6 to address these issues.
[14.04.2015] Coordinated public security advisory released.
[2] http://www.exploit-db.com/exploits/36763/
[3] http://cxsecurity.com/issue/WLB-2015040072
[4] http://packetstormsecurity.com/files/131436
[5] http://osvdb.org/show/osvdb/120791
[6] https://exchange.xforce.ibmcloud.com/vulnerabilities/102417
[7] https://wpvulndb.com/vulnerabilities/7905
[8] https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/miwoftp/miwoftp-106-cross-site-request-forgery-leading-to-remote-code-execution
[16.04.2015] - Added reference [2], [3], [4] and [5]
[20.04.2015] - Added reference [6]
[21.06.2015] - Added reference [7]
[16.12.2022] - Added reference [8]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2015-5242
Type: Local/Remote
Impact: Cross-Site Scripting, System Access
Risk: (4/5)
Release Date: 14.04.2015
Summary
MiwoFTP is a smart, fast and lightweight file manager plugin that operates from the back-end of WordPress.Description
MiwoFTP WP Plugin suffers from a cross-site request forgery remote code execution vulnerability. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions like executing arbitrary PHP code by uploading a malicious PHP script file, with administrative privileges, if a logged-in user visits a malicious web site.Vendor
Miwisoft LLC - http://www.miwisoft.comAffected Version
1.0.5Tested On
Apache 2.4.10 (Win32)PHP 5.6.3
MySQL 5.6.21
Vendor Status
[24.03.2015] Vulnerability discovered.[25.03.2015] Vendor contacted.
[25.03.2015] Vendor responds asking more details.
[26.03.2015] Sent details to the vendor.
[27.03.2015] Vendor forwarded details to developers.
[30.03.2015] Vendor confirms vulnerability scheduling patch by end of week.
[31.03.2015] Replied to the vendor.
[09.04.2015] Asked vendor for status update.
[12.04.2015] No reply from the vendor.
[13.04.2015] Asked vendor for status update.
[13.04.2015] Vendor replies promising patch by end of week.
[14.04.2015] Vendor releases version 1.0.6 to address these issues.
[14.04.2015] Coordinated public security advisory released.
PoC
miwoftp_rce.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>References
[1] http://miwisoft.com/wordpress-plugins/miwoftp-wordpress-file-manager#changelog[2] http://www.exploit-db.com/exploits/36763/
[3] http://cxsecurity.com/issue/WLB-2015040072
[4] http://packetstormsecurity.com/files/131436
[5] http://osvdb.org/show/osvdb/120791
[6] https://exchange.xforce.ibmcloud.com/vulnerabilities/102417
[7] https://wpvulndb.com/vulnerabilities/7905
[8] https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/miwoftp/miwoftp-106-cross-site-request-forgery-leading-to-remote-code-execution
Changelog
[14.04.2015] - Initial release[16.04.2015] - Added reference [2], [3], [4] and [5]
[20.04.2015] - Added reference [6]
[21.06.2015] - Added reference [7]
[16.12.2022] - Added reference [8]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk