WordPress Plugin Vulnerabilities

Backup Guard < 1.6.0 - Authenticated Arbitrary File Upload

Description

The plugin did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.

Additional Info, and Bypass of .htaccess protection found by WPScanTeam, while confirming the issue:

There is a protection in place against accessing the uploaded files, via a .htaccess in the wp-content/uploads/backup-guard/ folder, however:
- Some web servers do not support .htaccess, e.g Nginx, making it useless in such case
- Arbitrary content can be appended to the existing .htaccess, to make the deny from all invalid, and bypass the protection on web servers such as Apache

Note: v1.6.0 forced the uploaded file to have the .sgbp extension by adding it if not present, but the file content is not verified, which could still allow chaining with an issue such as LFI or Arbitrary File Renaming to achieve RCE

Proof of Concept

Affects Plugins

Fixed in 1.6.0

References

Miscellaneous

Original Researcher
Nguyen Van Khanh - SunCSR (Sun* Cyber Security Research)
Submitter
khanh
Verified
Yes

Timeline

Publicly Published
2021-02-18 (about 4 years ago)
Added
2021-02-18 (about 4 years ago)
Last Updated
2021-02-20 (about 4 years ago)

Other