
19 changes to exploits/shellcodes WebKit - WebAssembly Parsing Does not Correctly Check Section Order CyberArk Password Vault < 9.7 / < 10 - Memory Disclosure H2 Database - 'Alias' Arbitrary Code Execution GoldWave 5.70 - Local Buffer Overflow (SEH Unicode) PMS 0.42 - Local Stack-Based Overflow (ROP) Unitrends UEB 10.0 - Unauthenticated Root Remote Code Execution WolfCMS 0.8.3.1 - Cross Site Request Forgery Cobub Razor 0.7.2 - Add New Superuser Account MyBB Plugin Recent Threads On Index - Cross-Site Scripting WolfCMS 0.8.3.1 - Open Redirection Yahei PHP Prober 0.4.7 - Cross-Site Scripting WordPress Plugin Simple Fields 0.2 - 0.3.5 - Local/Remote File Inclusion / Remote Code Execution CyberArk Password Vault Web Access < 9.9.5 / < 9.10 / 10.1 - Remote Code Execution KYOCERA Multi-Set Template Editor 3.4 - Out-Of-Band XML External Entity Injection KYOCERA Net Admin 3.4 - Cross Site Request Forgery - Add Admin Exploit Buddypress Xprofile Custom Fields Type 2.6.3 - Remote Code Execution WooCommerce CSV-Importer-Plugin 3.3.6 - Remote Code Execution iScripts SonicBB 1.0 - Reflected Cross-Site Scripting WordPress Plugin Google Drive 2.2 - Remote Code Execution
47 lines
No EOL
1.3 KiB
Text
47 lines
No EOL
1.3 KiB
Text
# Exploit Title: Plugin Buddypress Xprofile Custom Fields Type 2.6.3 RCE – Unlink
|
||
# Date: 08/04/2018
|
||
# Exploit Author: Lenon Leite
|
||
# Vendor Homepage:
|
||
# https://wordpress.org/plugins/buddypress-xprofile-custom-fields-type/
|
||
# Software Link:
|
||
# https://wordpress.org/plugins/buddypress-xprofile-custom-fields-type/
|
||
# Contact: http://twitter.com/lenonleite
|
||
# Website: http://lenonleite.com.br/
|
||
# Category: webapps
|
||
# Version: 2.6.3
|
||
# Tested on: Ubuntu 16.1
|
||
#
|
||
#Article:
|
||
#http://lenonleite.com.br/publish-exploits/plugin-buddypress-xprofile-custom-fields-type-2-6-3-rce-unlink/
|
||
#
|
||
#Video:
|
||
#https://www.youtube.com/watch?v=By7kT7UbHVk
|
||
#
|
||
|
||
1 - Description
|
||
- Type user access: any user registered used in BuddyPress.
|
||
- $_POST[ 'field_' . $field_id . '_hiddenfile' ] is not escaped.
|
||
- $_POST[ 'field_' . $field_id . '_deleteimg' ] is not escaped.
|
||
|
||
|
||
2. Proof of Concept
|
||
|
||
Login as regular user.
|
||
|
||
1- Log in with BuddyPress User
|
||
|
||
2 - Access Edit Profile:
|
||
|
||
http://target/members/admin/profile/edit/
|
||
|
||
3 - Register data with image:
|
||
|
||
<http://target/wp-content/uploads/2018/01/buddypress-profile.png>4
|
||
- Change parameter to delete image in html and save profile:
|
||
<http://target/wp-content/uploads/2018/01/buddypress-profile2.png>
|
||
<http://target/wp-content/uploads/2018/01/buddypress-profile3-1.png>
|
||
|
||
#--
|
||
#*Atenciosamente*
|
||
#
|
||
#*Lenon Leite* |