Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Transposh WordPress Translation 1.0.8.1 Remote Code Execution[6]
- Authored by Julien Ahrens[7] | Site rcesecurity.com[8]
-
Transposh WordPress Translation versions 1.0.8.1 and below have a "save_transposh" action available at "/wp-admin/admin.php?page=tp_advanced" that does not properly validate the "Log file name" allowing an attacker with the "Administrator" role to specify a .php file as the log destination. Since the log file is stored directly within the "/wp-admin" directory, executing arbitrary PHP code is possible by simply sending a crafted request that gets logged.
- advisories | CVE-2022-25812[9]
- SHA-256 |
8347827a18239dee9d623ea317bc7751b1e867031f7d4bbe6349594f42f4006f
- Download[10] | Favorite[11] | View[12]
Change Mirror[13] Download[14]
RCE Security Advisory
https://www.rcesecurity.com
1. ADVISORY INFORMATION
=======================
Product: Transposh WordPress Translation
Vendor URL: https://wordpress.org/plugins/transposh-translation-filter-for-wordpress/
Type: Reliance on File Name or Extension of Externally-Supplied File [CWE-646]
Date found: 2022-02-21
Date published: 2022-07-22
CVSSv3 Score: 9.1 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
CVE: CVE-2022-25812
2. CREDITS
==========
This vulnerability was discovered and researched by Julien Ahrens from
RCE Security.
3. VERSIONS AFFECTED
====================
Transposh WordPress Translation 1.0.8.1 and below
4. INTRODUCTION
===============
Transposh translation filter for WordPress offers a unique approach to blog
translation. It allows your blog to combine automatic translation with human
translation aided by your users with an easy to use in-context interface.
(from the vendor's homepage)
5. VULNERABILITY DETAILS
========================
The plugin's "save_transposh" action available at "/wp-admin/admin.php?page=tp_advanced"
does not properly validate the "Log file name" allowing an attacker with the
"Administrator" role to specify a .php file as the log destination.
Since the log file is stored directly within the "/wp-admin" directory, executing
arbitrary PHP code is possible by simply sending a crafted request that gets
logged.
Successful exploits can allow the attacker to compromise the entire WordPress
installation. This is specifically relevant in multi-site installations.
6. PROOF OF CONCEPT
===================
1.Go to "/wp-admin/admin.php?page=tp_advanced" and "Enable debugging" by pointing
it to a filename with a .php extension.
2.Set the "Level of logging" to "Debug"
3.Saving the settings
4.Submit a payload like "<?php phpinfo();?>" to any of Transposh's functionalities.
5.Go to "/wp-admin/[your-filename.php]" to trigger the code injection
7. SOLUTION
===========
None. Remove the plugin to prevent exploitation.
8. REPORT TIMELINE
==================
2022-02-21: Discovery of the vulnerability
2022-02-21: Contacted the vendor via email
2022-02-21: Vendor response
2022-02-22: CVE requested from WPScan (CNA)
2022-02-23: WPScan assigns CVE-2022-25812
2022-05-22: Sent request for status update on the fix
2022-05-24: Vendor states that there is no update planned so far
2022-07-22: Public disclosure
9. REFERENCES
=============
https://github.com/MrTuxracer/advisories
File Tags
- ActiveX[19] (932)
- Advisory[20] (77,846)
- Arbitrary[21] (15,175)
- BBS[22] (2,859)
- Bypass[23] (1,575)
- CGI[24] (1,013)
- Code Execution[25] (6,706)
- Conference[26] (671)
- Cracker[27] (797)
- CSRF[28] (3,273)
- DoS[29] (21,908)
- Encryption[30] (2,335)
- Exploit[31] (49,943)
- File Inclusion[32] (4,148)
- File Upload[33] (945)
- Firewall[34] (821)
- Info Disclosure[35] (2,552)
- Intrusion Detection[36] (857)
- Java[37] (2,809)
- JavaScript[38] (801)
- Kernel[39] (6,077)
- Local[40] (14,031)
- Magazine[41] (586)
- Overflow[42] (12,226)
- Perl[43] (1,412)
- PHP[44] (5,051)
- Proof of Concept[45] (2,283)
- Protocol[46] (3,325)
- Python[47] (1,404)
- Remote[48] (29,754)
- Root[49] (3,452)
- Ruby[50] (577)
- Scanner[51] (1,630)
- Security Tool[52] (7,711)
- Shell[53] (3,066)
- Shellcode[54] (1,203)
- Sniffer[55] (882)
- Spoof[56] (2,090)
- SQL Injection[57] (16,032)
- TCP[58] (2,362)
- Trojan[59] (676)
- UDP[60] (866)
- Virus[61] (660)
- Vulnerability[62] (30,514)
- Web[63] (9,058)
- Whitepaper[64] (3,720)
- x86[65] (943)
- XSS[66] (17,353)
- Other[67]
File Archives
- July 2022[68]
- June 2022[69]
- May 2022[70]
- April 2022[71]
- March 2022[72]
- February 2022[73]
- January 2022[74]
- December 2021[75]
- November 2021[76]
- October 2021[77]
- September 2021[78]
- August 2021[79]
- Older[80]
Systems
- AIX[81] (426)
- Apple[82] (1,890)
- BSD[83] (368)
- CentOS[84] (55)
- Cisco[85] (1,913)
- Debian[86] (5,948)
- Fedora[87] (1,690)
- FreeBSD[88] (1,241)
- Gentoo[89] (4,152)
- HPUX[90] (878)
- iOS[91] (319)
- iPhone[92] (108)
- IRIX[93] (220)
- Juniper[94] (67)
- Linux[95] (42,501)
- Mac OS X[96] (683)
- Mandriva[97] (3,105)
- NetBSD[98] (255)
- OpenBSD[99] (478)
- RedHat[100] (11,767)
- Slackware[101] (941)
- Solaris[102] (1,607)
- SUSE[103] (1,444)
- Ubuntu[104] (7,910)
- UNIX[105] (9,094)
- UnixWare[106] (185)
- Windows[107] (6,434)
- Other[108]
