WordPress Plugin Vulnerabilities
WooCommerce Catalog Enquiry - Arbitrary File Upload
Description
Email from user:
"A 'fix' for the file upload vulnerability seems to have been introduced in version 3.0.2 with the cryptic description "Fixed some data issues."
However I hope you're aware that the vulnerability still exists and can be exploited by simply changing Content-Type in the HTTP request. You're trusting the client to be honest about Content-Type when you check "type" from $_FILES. The very first comment at http://php.net/manual/en/reserved.variables.files.php warns about this."
Additional notes:
File is uploaded to the '/wp-content/uploads/catalog_enquiry/' directory. Content type of "image/png" works.
Affects Plugins
References
Miscellaneous
Submitter
ethicalhack3r
Submitter twitter
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2017-04-20 (about 9 years ago)
Added
2017-07-19 (about 8 years ago)
Last Updated
2020-09-22 (about 5 years ago)