WordPress Plugin Vulnerabilities

WooCommerce Upload Files < 59.4 - Unauthenticated Arbitrary File Upload

Description

The plugin ran a single sanitization pass to remove blocked extensions such as .php. It was possible to bypass this and upload a file with a PHP extension by embedding a "blocked" extension within another "blocked" extension in the "wcuf_file_name" parameter. It was also possible to perform a double extension attack and upload files to a different location via path traversal using the "wcuf_current_upload_session_id" parameter.

Affects Plugins

References

Classification

Type
RCE
OWASP top 10
CWE

Miscellaneous

Original Researcher
Ramuel Gall
Submitter
Ramuel Gall
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2021-03-04 (about 3 years ago)
Added
2021-03-04 (about 3 years ago)
Last Updated
2021-04-03 (about 3 years ago)

Other