WordPress Plugin Vulnerabilities

Brizy < 2.3.12 - Authenticated File Upload and Path Traversal

Description

Using the brizy_create_block_screenshot AJAX action, it was possible to provide a filename using the id parameter, and populate the file contents via the ibsf parameter, which would be base64-decoded and written to the file. While the plugin appended .jpg to all uploaded filenames, a double extension attack was also possible.

For instance, a file named shell.php would be saved as shell.php.jpg, and would be executable on a number of common configurations, including Apache/modPHP with an AddHandler or unanchored SetHandler directive. An attacker could also prepend their filename with ../ to perform a directory traversal attack and place their file in an arbitrary location.

Affects Plugins

Fixed in 2.3.12

References

Miscellaneous

Original Researcher
Ramuel Gall
Submitter
Ramuel Gall
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2021-10-13 (about 4 years ago)
Added
2021-10-13 (about 4 years ago)
Last Updated
2022-04-12 (about 4 years ago)

Other