An issue was discovered in the AccessKeys AccessPress Anonymous Post Pro plugin through 3.1.9 for WordPress. Improper input sanitization allows the attacker to override the settings for allowed file extensions and upload file size, related to inc/cores/file-uploader.php and file-uploader/file-uploader-class.php. This allows the attacker to upload anything they want to the server, as demonstrated by an action=ap_file_upload_action&allowedExtensions[]=php request to /wp-admin/admin-ajax.php that results in a .php file upload and resultant PHP code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/145398/Accesspress-Anonymous-Post-Pro-Unauthenticated-Arbitrary-File-Upload.html | Exploit Third Party Advisory VDB Entry |
https://wpvulndb.com/vulnerabilities/8977 | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43324/ | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-12-18T17:00:00
Updated: 2017-12-19T10:57:01
Reserved: 2017-11-26T00:00:00
Link: CVE-2017-16949
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-12-19T02:29:41.503
Modified: 2018-01-12T15:40:06.207
Link: CVE-2017-16949
JSON object: View
Redhat Information
No data.
CWE