Description
The WooCommerce Upload Files WordPress plugin before 59.4 ran a single sanitization pass to remove blocked extensions such as .php. It was possible to bypass this and upload a file with a PHP extension by embedding a "blocked" extension within another "blocked" extension in the "wcuf_file_name" parameter. It was also possible to perform a double extension attack and upload files to a different location via path traversal using the "wcuf_current_upload_session_id" parameter.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11085 | The WooCommerce Upload Files WordPress plugin before 59.4 ran a single sanitization pass to remove blocked extensions such as .php. It was possible to bypass this and upload a file with a PHP extension by embedding a "blocked" extension within another "blocked" extension in the "wcuf_file_name" parameter. It was also possible to perform a double extension attack and upload files to a different location via path traversal using the "wcuf_current_upload_session_id" parameter. |
References
History
Mon, 25 Nov 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vanquish
Vanquish woocommerce Upload Files |
|
| CPEs | cpe:2.3:a:vanquish:woocommerce_upload_files:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Woocommerce
Woocommerce upload Files |
Vanquish
Vanquish woocommerce Upload Files |
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:21:18.699Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24171
No data.
Status : Modified
Published: 2021-04-05T19:15:15.857
Modified: 2024-11-25T18:14:49.230
Link: CVE-2021-24171
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD