In the process of rigorous testing, a critical vulnerability was unearthed in the Frontend File Manager Plugin, up to version affected, tagged with CVE-2023-5105. This vulnerability opens a path traversal avenue, allowing an attacker to download operating system files, including sensitive ones like wp-config.php. The severity lies in the potential compromise of the entire domain, especially alarming as this can be exploited by a user with Editor privileges.

Main info:

CVECVE-2023-5105
PluginFrontend File Manager Plugin
CriticalVery High
All Time178 210
Active installations1000+
Publicly PublishedNovember 13, 2023
Last UpdatedNovember 13, 2023
ResearcherDmtirii Ignatyev
OWASP TOP-10A3: Sensitive Data Exposure
PoCYes
ExploitWill be later
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5105
https://wpscan.com/vulnerability/d40c7108-bad6-4ed3-8539-35c0f57e62cc/
Plugin Security Certification by CleanTalk

Timeline

September 21, 2023Plugin testing and vulnerability detection in the Frontend File Manager Plugin plugin have been completed
September 21, 2023I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
November 6, 2023The author fixed the vulnerability and released the plugin update
November 13, 2023Registered CVE-2023-5105

Discovery of the Vulnerability

During testing of the plugin, a vulnerability was discovered that allows you to bypass the logic through file downloads and download OS files from the system, including php files. It turns out that an attacker can download a file wp-config.php connect to the database and take over the domain completely, which will lead to terrible consequences. This is very critical. Since this can be done on behalf of the Editor, which does not have privileges to work with files and code directly

Understanding of Path Traversal attack’s

Path traversal, also known as directory traversal, is a web security vulnerability that allows attackers to access files and directories outside the web server’s root directory. In the context of WordPress, this vulnerability could be exploited to navigate beyond the intended file paths, potentially revealing sensitive information or executing malicious actions. In the case of the Frontend File Manager Plugin, this meant an unauthorized user could download critical files from the server.

Exploiting the LFI Vulnerability

Exploiting the path traversal vulnerability in the Frontend File Manager Plugin involves manipulating file download requests to traverse directories. By crafting specific requests, an attacker could bypass restrictions, allowing them to download files such as wp-config.php, which contains sensitive information, including database credentials. This exploit can be executed under the guise of an Editor, a role not typically endowed with direct file and code manipulation privileges.

POC:

1) Create new post with this shortcode – [ffmwp]

2) Go to new post and upload any file

3) After that go to main page of plugin for users http://your_site/wordpress/wp-admin/edit.php?post_type=wpfm-files

4) Click to “Edit” button

5) Change wpfm_dir_path and wpfm_file_url to /var/www/html/wordpress/wp-config.php

6) Go back to the main page http://your_site/wordpress/wp-admin/edit.php?post_type=wpfm-files and click “Download”

___

The consequences of this vulnerability are severe. An attacker exploiting CVE-2023-5105 could:

  • Access wp-config.php, potentially gaining control over database credentials.
  • Execute arbitrary code, leading to a complete takeover of the WordPress site.
  • Compromise the entire domain, leading to data loss, unauthorized access, and potential reputational damage.

In a real-world scenario, an Editor-level user could unwittingly become a vector for a malicious actor to compromise the entire WordPress site.

Recommendations for Improved Security

To mitigate the risks associated with path traversal vulnerabilities in WordPress plugins:

  • Developers should implement robust input validation and sanitize user inputs to prevent directory traversal attacks.
  • Regularly update the Frontend File Manager Plugin to patches addressing known vulnerabilities.
  • Administrators should apply the principle of least privilege, limiting the capabilities of user roles, even trusted ones like Editors.

Promptly addressing and patching such vulnerabilities is crucial to maintaining the security and integrity of WordPress sites. Users and developers alike play pivotal roles in ensuring the robustness of the WordPress ecosystem.

#WordPressSecurity #PathTraversal #WebsiteSafety #StayProtected #VeryHighVulnerability

Use CleanTalk solutions to improve the security of your website

DMITRII I.

Create your CleanTalk account



By signing up, you agree with license. Have an account? Log in.
CVE-2023-5105 – Frontend File Manager Plugin – Path Traversal to Full Control – POC

Leave a Reply

Your email address will not be published. Required fields are marked *