Vulnerabilities > CVE-2014-9308 - Unspecified vulnerability in Wpeasycart WP Easycart

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
wpeasycart
exploit available
metasploit

Summary

Unrestricted file upload vulnerability in inc/amfphp/administration/banneruploaderscript.php in the WP EasyCart (aka WordPress Shopping Cart) plugin before 3.0.9 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in products/banners/.

Vulnerable Configurations

Part Description Count
Application
Wpeasycart
93

Exploit-Db

  • descriptionWordPress Shopping Cart 3.0.4 - Unrestricted File Upload. CVE-2014-9308. Webapps exploit for php platform
    fileexploits/php/webapps/35730.html
    idEDB-ID:35730
    last seen2016-02-04
    modified2015-01-08
    platformphp
    port80
    published2015-01-08
    reporterKacper Szurek
    sourcehttps://www.exploit-db.com/download/35730/
    titleWordPress Shopping Cart 3.0.4 - Unrestricted File Upload
    typewebapps
  • descriptionWordPress WP EasyCart Unrestricted File Upload. CVE-2014-9308. Webapps exploit for php platform
    idEDB-ID:36043
    last seen2016-02-04
    modified2015-02-10
    published2015-02-10
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/36043/
    titleWordPress WP EasyCart - Unrestricted File Upload

Metasploit

descriptionWordPress Shopping Cart (WP EasyCart) Plugin for WordPress contains a flaw that allows a remote attacker to execute arbitrary PHP code. This flaw exists because the /inc/amfphp/administration/banneruploaderscript.php script does not properly verify or sanitize user-uploaded files. By uploading a .php file, the remote system will place the file in a user-accessible path. Making a direct request to the uploaded file will allow the attacker to execute the script with the privileges of the web server. In versions <= 3.0.8 authentication can be done by using the WordPress credentials of a user with any role. In later versions, a valid EasyCart admin password will be required that is in use by any admin user. A default installation of EasyCart will setup a user called "demouser" with a preset password of "demouser".
idMSF:EXPLOIT/UNIX/WEBAPP/WP_EASYCART_UNRESTRICTED_FILE_UPLOAD
last seen2020-06-05
modified2018-10-01
published2015-01-10
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9308
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/unix/webapp/wp_easycart_unrestricted_file_upload.rb
titleWordPress WP EasyCart Unrestricted File Upload

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/129875/wpshoppingcart-shell.txt
idPACKETSTORM:129875
last seen2016-12-05
published2015-01-09
reporterKacper Szurek
sourcehttps://packetstormsecurity.com/files/129875/WordPress-Shopping-Cart-3.0.4-Unrestricted-File-Upload.html
titleWordPress Shopping Cart 3.0.4 Unrestricted File Upload

Seebug

bulletinFamilyexploit
description<p># 受影响版本: WordPress Shopping Cart 3.0.4&nbsp;</p><p># 日期: 29-10-2014</p><p># 软件链接: <a href="https://wordpress.org/plugins/wp-easycart/" rel="nofollow">https://wordpress.org/plugins/wp-easycart/</a></p><p># CVE: CVE-2014-9308</p><p># 类别: 应用程序</p><p>漏洞详情:</p><p>任何注册用户都可以上传任何文件。<br></p><p>上传点: wp-easycart\inc\amfphp\administration\banneruploaderscript.php<br></p><p>$date = $_POST['datemd5'];</p><p>$usersqlquery = sprintf("SELECT &nbsp;ec_user.*, ec_role.admin_access FROM &nbsp;ec_user &nbsp;LEFT JOIN ec_role ON (ec_user.user_level = ec_role.role_label) WHERE &nbsp;ec_user.password = '%s' AND &nbsp;(ec_user.user_level = 'admin' OR ec_role.admin_access = 1)", mysql_real_escape_string($requestID));</p><p>$userresult = mysql_query($usersqlquery);</p><p>$users = mysql_fetch_assoc($userresult);</p><p>if ($users || is_user_logged_in()) {</p><p> $filename = $_FILES['Filedata']['name'];</p><p> $filetmpname = $_FILES['Filedata']['tmp_name'];</p><p> $fileType = $_FILES["Filedata"]["type"];</p><p> $fileSizeMB = ($_FILES["Filedata"]["size"] / 1024 / 1000);</p><p> $explodedfilename = pathinfo($filename);</p><p> $nameoffile = $explodedfilename['filename'];</p><p> $fileextension = $explodedfilename['extension'];</p><p> move_uploaded_file($_FILES['Filedata']['tmp_name'], "../../../products/banners/".$nameoffile."_".$date.".".$fileextension);</p><p>}</p> 验证: Login as regular user (created using wp-login.php?action=register): &lt;form action=&#34;http://wordpress-install/wp-content/plugins/wp-easycart/inc/amfphp/administration/banneruploaderscript.php&#34; method=&#34;post&#34; enctype=&#34;multipart/form-data&#34;&gt; &lt;input type=&#34;hidden&#34; name=&#34;datemd5&#34; value=&#34;1&#34;&gt; &lt;input type=&#34;file&#34; name=&#34;Filedata&#34;&gt; &lt;input value=&#34;Upload!&#34; type=&#34;submit&#34;&gt; &lt;/form&gt; File will be visible: http://wordpress-install/wp-content/plugins/wp-easycart/products/banners/%filename%_1.%fileextension%
idSSV:89276
last seen2017-11-19
modified2015-08-31
published2015-08-31
sourcehttps://www.seebug.org/vuldb/ssvid-89276
titleWordPress Shopping Cart 3.0.4 --任意文件上传