exploit the possibilities

WordPress Analytics Stats Counter Statistics 1.2.2.5 PHP Object Injection

WordPress Analytics Stats Counter Statistics 1.2.2.5 PHP Object Injection
Posted Mar 1, 2017
Authored by Yorick Koster, Securify B.V.

WordPress Analytics Stats Counter Statistics plugin version 1.2.2.5 suffers from a PHP object injection vulnerability.

tags | advisory, php
MD5 | 91725ba3f4733fa4edc420ef97e32a71

WordPress Analytics Stats Counter Statistics 1.2.2.5 PHP Object Injection

Change Mirror Download
------------------------------------------------------------------------
Analytics Stats Counter Statistics WordPress Plugin unauthenticated PHP
Object injection vulnerability
------------------------------------------------------------------------
Yorick Koster, June 2016

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A PHP Object injection vulnerability was found in the Analytics Stats
Counter Statistics WordPress Plugin, which can be used by an
unauthenticated user to instantiate arbitrary PHP Objects. Using this
vulnerability it is possible to execute arbitrary PHP code.

------------------------------------------------------------------------
OVE ID
------------------------------------------------------------------------
OVE-20160803-0005

------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully tested on the Analytics Stats Counter
Statistics WordPress Plugin version 1.2.2.5.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
There is currently no fix available.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://sumofpwn.nl/advisory/2016/analytics_stats_counter_statistics_wordpress_plugin_unauthenticated_php_object_injection_vulnerability.html

This issue is possible due to an unsafe call to unserialize() in the wpadm_unpack() method. The input is taken directly from the POST request as can be seen in the following code fragment:

wpadm.php:

if ( ! function_exists( 'wpadm_run' )) {
function wpadm_run($pl, $dir) {
@set_time_limit(0);
require_once dirname(__FILE__) . '/class-wpadm-method-class.php';
$request_name = 'wpadm_'.$pl.'_request';
if( isset( $_POST[$request_name] ) && ! empty ( $_POST[$request_name] ) ) {
require_once dirname(__FILE__) . '/class-wpadm-core.php';
$wpadm = new WPAdm_Core(wpadm_unpack($_POST[$request_name]), $pl, $dir);
echo '<wpadm>'.wpadm_pack($wpadm->getResult()->toArray()).'</wpadm>';
exit;
}
}
}


if ( ! function_exists( 'wpadm_unpack' )) {
/**
* @param str $str
* @return mixed
*/
function wpadm_unpack( $str ) {
return unserialize( base64_decode( $str ) );
}
}

It has been confirmed that this issues can be used to execute arbitrary PHP code.


------------------------------------------------------------------------
Summer of Pwnage (https://sumofpwn.nl) is a Dutch community project. Its
goal is to contribute to the security of popular, widely used OSS
projects in a fun and educational way.

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    15 Files
  • 4
    Apr 4th
    5 Files
  • 5
    Apr 5th
    5 Files
  • 6
    Apr 6th
    27 Files
  • 7
    Apr 7th
    31 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close