vendor:
WordPress Shopping Cart
by:
Kacper Szurek
7.5
CVSS
HIGH
Unrestricted File Upload
434
CWE
Product Name: WordPress Shopping Cart
Affected Version From: 3.0.4
Affected Version To: 3.0.8
Patch Exists: YES
Related CWE: CVE-2014-9308
CPE: a:wordpress:wordpress_shopping_cart
Metasploit:
N/A
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/unix/webapp/wp_easycart_unrestricted_file_upload, https://www.infosecmatter.com/nessus-plugin-library/?id=500424, https://www.infosecmatter.com/nessus-plugin-library/?id=77087, https://www.infosecmatter.com/nessus-plugin-library/?id=77036, https://www.infosecmatter.com/nessus-plugin-library/?id=77004, https://www.infosecmatter.com/nessus-plugin-library/?id=79722, https://www.infosecmatter.com/nessus-plugin-library/?_page=22
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2014
WordPress Shopping Cart 3.0.4 Unrestricted File Upload
Any registered user can upload any file because of incorrect if statement inside banneruploaderscript.php. Proof of concept involves logging in as a regular user and submitting a form with a file input to banneruploaderscript.php. The file will be visible at http://wordpress-install/wp-content/plugins/wp-easycart/products/banners/%filename%_1.%fileextension%.
Mitigation:
Update to version 3.0.9