An issue was discovered in the AccessKeys AccessPress Anonymous Post Pro plugin through 3.1.9 for WordPress. Improper input sanitization allows the attacker to override the settings for allowed file extensions and upload file size, related to inc/cores/file-uploader.php and file-uploader/file-uploader-class.php. This allows the attacker to upload anything they want to the server, as demonstrated by an action=ap_file_upload_action&allowedExtensions[]=php request to /wp-admin/admin-ajax.php that results in a .php file upload and resultant PHP code execution.
References
Link Resource
http://packetstormsecurity.com/files/145398/Accesspress-Anonymous-Post-Pro-Unauthenticated-Arbitrary-File-Upload.html Exploit Third Party Advisory VDB Entry
https://wpvulndb.com/vulnerabilities/8977 Exploit Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/43324/ Exploit Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2017-12-18T17:00:00

Updated: 2017-12-19T10:57:01

Reserved: 2017-11-26T00:00:00


Link: CVE-2017-16949

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2017-12-19T02:29:41.503

Modified: 2018-01-12T15:40:06.207


Link: CVE-2017-16949

JSON object: View

cve-icon Redhat Information

No data.

CWE