An issue was discovered in the AccessKeys AccessPress Anonymous Post Pro plugin through 3.1.9 for WordPress. Improper input sanitization allows the attacker to override the settings for allowed file extensions and upload file size, related to inc/cores/file-uploader.php and file-uploader/file-uploader-class.php. This allows the attacker to upload anything they want to the server, as demonstrated by an action=ap_file_upload_action&allowedExtensions[]=php request to /wp-admin/admin-ajax.php that results in a .php file upload and resultant PHP code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/145398/Accesspress-Anonymous-Post-Pro-Unauthenticated-Arbitrary-File-Upload.html | Exploit Third Party Advisory VDB Entry |
https://wpvulndb.com/vulnerabilities/8977 | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43324/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2017-12-19 02:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-16949
Mitre link : CVE-2017-16949
CVE.ORG link : CVE-2017-16949
JSON object : View
Products Affected
accesspressthemes
- anonymous_post_pro
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type