what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Enable Media Replace SQL Injection / Shell Upload

WordPress Enable Media Replace SQL Injection / Shell Upload
Posted Feb 9, 2011
Authored by Ulf Harnhammar

Enable Media Replace WordPress plugin version 2.3 suffers from remote shell upload and SQL injection vulnerabilities.

tags | exploit, remote, shell, vulnerability, sql injection
SHA-256 | c704208044e25049fc23310c983128a5a4dd32de8271a106ecf2d492cf255edb

WordPress Enable Media Replace SQL Injection / Shell Upload

Change Mirror Download
PRODUCT NAME:        Enable Media Replace WordPress Plugin
PRODUCT URL 1: http://wordpress.org/extend/plugins/enable-media-replace/
PRODUCT URL 2: http://mansjonasson.se/wordpress-plugins/enable-media-replace/
PRODUCT AUTHOR: Mans Jonasson for .SE (Stiftelsen for Internetinfrastruktur) -- http://www.iis.se/
SECURITY RESEARCHER: Ulf Harnhammar -- http://thcxthcx.net/
AFFECTED VERSIONS: 2.3 and probably all prior versions
STATUS: Unpatched. Mans was contacted on 30 Jan and 3 Feb, but he is very busy with other
things than maintaining this plugin.
SOLUTION: Deactivate the plugin temporarily. Look for other plugins that will help you with
the media handling.
IMPACT: Information retrieval and manipulation, arbitrary code execution

VULNERABILITY DETAILS:

1) A user can perform SQL Injection attacks against the plugin at the Replace Media Upload page
(Media > Edit > Upload a new file). By changing the "attachment_id" parameter in the URL to:

attachment_id=99999+union+select+concat(0x20,user_login),+user_pass+from+wp_users+where+ID=1

.. the plugin will retrieve and display the administrator's user name and password hash. This
requires that the attacker has knowledge of the SQL table prefix, but that can be retrieved as
well from information_schema.TABLES .

NOTE: There are other SQL Injection bugs in the plugin code base, but it is currently not known if they
pose a security threat.

2) A user can upload arbitrary files, including PHP files, at the Replace Media Upload page using the
"Replace the file" functionality, which doesn't check if uploaded files have an allowed extension. This
can be exploited to execute arbitrary PHP code and for instance retrieve or change sensitive
information in the SQL database or the web server's file system.

Both issues require that the attacker has a valid user on the WordPress system with Author or higher
permissions. Therefore the vulnerabilities will have more of an impact in large organisations with
more users than in small organisations with fewer users.

// Ulf Harnhammar

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close