WordPress Plugin Vulnerabilities

SuperStoreFinder Plugins - Unauthenticated Arbitrary File Upload

Description

The SuperStoreFinder premium WordPress plugins did not properly check file uploads, depending on the plugin, only checking for the mime type and/or the first extension of the file name.

An attacker could set the Content-Type header to "Content-Type: text/csv", as well as use a double extension to bypass the checks in place, allowing arbitrary files to be uploaded.

The original advisory mentioned a Cross-Site Request Forgery (CSRF) vulnerability, however there was no need to use a CSRF attack as the request could be sent as an unauthenticated user.

According to the changelog, it appears that the plugin recently underwent a Penetration Test. It is possible that the patch from the penetration test was reverse engineered to create an exploit and posted to the PacketStorm repository.

Proof of Concept

Affects Plugins

References

Miscellaneous

Original Researcher
Eagle Eye
Verified
Yes

Timeline

Publicly Published
2020-10-21 (about 5 years ago)
Added
2020-10-21 (about 5 years ago)
Last Updated
2020-10-22 (about 5 years ago)

Other