WordPress Plugin Vulnerabilities

OMGF < 4.5.4 - Unauthenticated Path Traversal in REST API

Description

The plugin does not escape or validate the handle parameter of the REST API, which allows unauthenticated users to perform path traversal and overwrite arbitrary CSS file with Google Fonts CSS, or download fonts uploaded on Google Fonts website.

Proof of Concept

Access the URL below as unauthenticated. "cssfilename" is the file name of the CSS, excluding .css extension. The result will contain PHP error about missing directories, but should overwrite the file nonetheless. If an existing directory name is supplied, it will also download the specified fonts to that directory.

https://example.com/wp-json/omgf/v1/download/css?handle=/../../path/to/css/cssfilename&original_handle=b&family=Sora

Affects Plugins

Fixed in 4.5.4

References

Classification

Type
TRAVERSAL
OWASP top 10
CWE

Miscellaneous

Original Researcher
apple502j
Submitter
apple502j
Verified
Yes

Timeline

Publicly Published
2021-08-23 (about 2 years ago)
Added
2021-08-23 (about 2 years ago)
Last Updated
2022-03-07 (about 2 years ago)

Other