cve/2021/CVE-2021-24499.md
2024-06-18 02:51:15 +02:00

35 lines
1.9 KiB
Markdown

### [CVE-2021-24499](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24499)
![](https://img.shields.io/static/v1?label=Product&message=Workreap&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.2.2%3C%202.2.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-434%20Unrestricted%20Upload%20of%20File%20with%20Dangerous%20Type&color=brighgreen)
### Description
The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.
### POC
#### Reference
- http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html
- https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/
- https://wpscan.com/vulnerability/74611d5f-afba-42ae-bc19-777cdf2808cb
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/RyouYoo/CVE-2021-24499
- https://github.com/buka-pitch/Exploit-for-WordPress-Theme-Workreap-2.2.2
- https://github.com/hh-hunter/cve-2021-24499
- https://github.com/j4k0m/CVE-2021-24499
- https://github.com/jytmX/CVE-2021-24499
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/whoforget/CVE-POC
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youwizard/CVE-POC