WordPress Plugin Vulnerabilities

Download Manager < 3.1.23 - Unauthorised Asset Manager Usage

Description

The majority of the AJAX actions related to the Asset Manager use the same nonce action (ie the NONCE_KEY constant), and are lacking any authorisation checks. Given that the nonce is available in other pages, accessible by low priviledge users (such as author, or even subscribers depending on the plugin's feature used), this could lead to unauthorised use of the Asset Manager.

Exploitation of the mkDir, newFile, scanDir, createZip, unZip, deleteItem, openFile, fileSettings, saveFile, moveItem, copyItem would be quite difficult to achieve, as their file/path parameters are encrypted using SECURE_AUTH_KEY or NONCE_SALT, nonetheless, they should be properly secured.

However, the addComment, addShareLink, getLinkDet, updateLink, deleteLink and renameItem can be exploited.

Proof of Concept

Affects Plugins

Fixed in 3.1.23

Classification

Type
ACCESS CONTROLS
CWE
CVSS

Miscellaneous

Original Researcher
WPScanTeam
Verified
Yes

Timeline

Publicly Published
2021-04-30 (about 4 years ago)
Added
2021-04-30 (about 4 years ago)
Last Updated
2021-04-30 (about 4 years ago)

Other