Get your server issues fixed by our experts for a price starting at just 25 USD/Hour. Click here to register and open a ticket with us now!

Author Topic: ET WEB_SERVER Aribitrary File Upload Vulnerability in WP Mobile Detector  (Read 2435 times)

0 Members and 1 Guest are viewing this topic.

nidhinjo

  • Guest
A vulnerability in the WordPress Mobile Detector plugin has been discovered, which could allow for remote code execution. WordPress Mobile Detector is used to display content on WordPress sites in a format suitable for phones and tablet devices. Successful exploitation of this vulnerability could result in an attacker being able to execute remote code in the context of the web server process or could allow for the uploading of arbitrary files. This may permit an attacker access to sensitive information and compromise the system.

Affected Products

WordPress WP Mobile Detector 3.5 and prior

TECHNICAL SUMMARY:

WordPress Mobile Detector is prone to a vulnerability that could allow for remote code execution due to a failure to sanitize user-supplied input submitted to the ‘src’ parameter of the ‘resize.php' file located in the plugin directory. An attacker can make a POST request to the php file with a malicious URL as the payload to be uploaded onto the plugin cache directory, using the following syntax:

http://[site]/wp-content/plugins/wp-mobile-detector/resize.php?src=[URL of upload file]

After uploading a malicious file (such as a php file that can execute remote code on the server), an attacker can execute his malicious payload with a call to the uploaded script on the server.

This attack utilizes the file_get_contents() function to upload a file onto the server and would require the allow_url_fopen field of the PHP configuration to be enabled for the function to upload a file whose path is given by a URL. Hence, for this attack to work, allow_url_fopen needs to be enabled.

Successful exploitation of this vulnerability could result in an attacker being able to execute remote code in the context of the web server process or could allow for the uploading of arbitrary files. This may allow an attacker access to sensitive information and compromise the system.

RECOMMENDATION

We recommend the following actions be taken:
· Remove the Mobile Detector plugin if it is not needed.
· Update the Mobile Detector plugin to its most recent version.
· Otherwise, disable the allow_url_fopen of the PHP configuration if that field is not needed. Note: This may render your WordPress installation inoperable or unstable.
· Consider implementation of a Web Application Firewall to mitigate common threats to publically available webservers.
· Review and follow WordPress hardening guidelines - http://codex.wordpress.org/Hardening_WordPress
· Confirm that the operating system and all other applications on the system running this CMS are updated with the most recent patches.
· Deploy NIDS to detect and block attacks and anomalous activity such as crafted requests containing suspicious URI sequences.
· Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack.