Description
Omni Secure Files plugin versions prior to 0.1.14 contain an arbitrary file upload vulnerability in the bundled plupload example endpoint. The /wp-content/plugins/omni-secure-files/plupload/examples/upload.php handler allows unauthenticated uploads without enforcing safe file type restrictions, enabling an attacker to place attacker-controlled files under the plugin's uploads directory. This can lead to remote code execution if a server-executable file type is uploaded and subsequently accessed.
Problem types
CWE-434 Unrestricted Upload of File with Dangerous Type
Product status
Any version before 0.1.14
Timeline
| 2012-06-07: | Vulnerability was publicly disclosed |
Credits
Adrien Thierry
References
wpscan.com/...rability/376fd666-6471-479c-9b74-1d8088a33e89/
wpscan.com/...rability/376fd666-6471-479c-9b74-1d8088a33e89/
www.wordfence.com/...secure-files-0113-arbitrary-file-upload
wordpress.org/plugins/omni-secure-files/
www.acunetix.com/...upload-php-arbitrary-file-upload-0-1-13/
web.archive.org/...12632/http://secunia.com/advisories/49441
packetstorm.news/files/id/113411
www.exploit-db.com/exploits/19009
web.archive.org/.../https://www.securityfocus.com/bid/53872/
www.vulncheck.com/...s-unauthenticated-arbitrary-file-upload