WooCommerce Catalog Enquiry - Arbitrary File Upload

Sign up to our free email alerts service for instant vulnerability notifications!

Description
Email from user:

"A 'fix' for the file upload vulnerability seems to have been introduced in version 3.0.2 with the cryptic description "Fixed some data issues."

However I hope you're aware that the vulnerability still exists and can be exploited by simply changing Content-Type in the HTTP request. You're trusting the client to be honest about Content-Type when you check "type" from $_FILES. The very first comment at http://php.net/manual/en/reserved.variables.files.php warns about this."

Additional notes:

File is uploaded to the '/wp-content/uploads/catalog_enquiry/' directory. Content type of "image/png" works.

Affects Plugin

References

URL https://www.pluginvulnerabilities.com/2017/04/20/arbitrary-file-upload-vulnerability-in-woocommerce-catalog-enquiry/

Classification

Type UPLOAD
CWE CWE-434

Miscellaneous

Submitter ethicalhack3r
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 116
Verified Yes
WPVDB ID 8865

Timeline

Publicly Published 2017-04-20 (8 months ago)
Added 2017-07-19 (5 months ago)
Last Updated 2017-07-19 (5 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.