Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 10 Jun 2015 16:29:34 +0200
From: Sebastian Wolfgang Kraemer | HSASec <>
CC: "" <>, 
 "" <>,
 Gordon Rohrmair <>
Subject: CVE Request: Arbitrary file upload in Wordpress 4.1.1


referring to your mail

> Date: Tue, 28 Apr 2015 15:27:03 -0400 (EDT)
> From:
> To:
> Cc:,
> Subject: Re: Possible CVE Request: Wordpress 4.1.2 security release

we want to request a CVE for the vulnerability discussed in your mail:

> > In WordPress 4.1 and higher, files with invalid or unsafe names could
> > be uploaded. Discovered by Michael Kapfer and Sebastian Kraemer of
> > HSASec.

The vulnerability was fixed with the update 4.1.2 and was (according to your assumption) located in this call graph:

- /wp-admin/async-upload.php : (Index)
- - /wp-admin/includes/ajax-actions.php : wp_ajax_upload_attachment
- - - /wp-includes/functions.php : wp_check_filetype_and_ext
- - - - /wp-includes/functions.php : wp_check_filetype

The validation of filenames in "/wp-includes/functions.php : wp_check_filetype" failed under certain circumstances if the user provided filename contains special chars of regular expressions.
Exploiting this vulnerability enables users with any fileupload-privilege to upload and execute any type of files. This results in the ability of executing arbitrary code.



* Sebastian Kraemer (
* Michael Kapfer ( 


Best regards,
 Michael Kapfer & Sebastian Kraemer 

Download attachment "smime.p7s" of type "application/pkcs7-signature" (5123 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.