WordPress Plugin Vulnerabilities
All in One SEO Pack < 4.1.0.2 - Admin RCE via unserialize
Description
The plugin enables authenticated users with "aioseo_tools_settings" privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin's configuration by uploading a backup .ini file in the section "Tool > Import/Export". However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution.
As exploitation requires high privileges, the main threat scenario concerns attackers willing to compromise system host on mutualized wordpress platform where plugin installation has been denied by security hardening by hosting provider (DISALLOW_FILE_MODS=true in config).
Proof of Concept
Affects Plugins
References
Classification
Type
RCE
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Vincent MICHEL
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-05-09 (about 4 years ago)
Added
2021-05-09 (about 4 years ago)
Last Updated
2021-05-11 (about 4 years ago)