Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-5311: CVE-2023-5311

The WP EXtra plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify the contents of the .htaccess files located in a site’s root directory or /wp-content and /wp-includes folders and achieve remote code execution.

CVE
#vulnerability#wordpress#php#rce#auth

Missing Authorization to .htaccess File lead to RCE

The minimum permission that a subscriber should have typically doesn’t include the ability to upload or overwrite files like .htaccess. However, if there is a vulnerability or misconfiguration that allows a subscriber to perform such actions, it could potentially lead to a successful Remote Code Execution (RCE) attack on the server.

  • In the register function, using any of the three different methods, we can completely upload the .htaccess file by utilizing one of the parameters: htaccess_root, htaccess_includes, and htaccess_content.

if (!empty($_POST[‘save_root’])) {

if (isset($_POST[‘wp_extra’][‘htaccess_root’])) {

$htaccess_root = trim(stripslashes($_POST[‘wp_extra’][‘htaccess_root’]));

@file_put_contents($path_root, $htaccess_root);

if (!empty($_POST[‘save_content’])) {

if (isset($_POST[‘wp_extra’][‘htaccess_content’])) {

$htaccess_content = trim(stripslashes($_POST[‘wp_extra’][‘htaccess_content’]));

if (!file_exists($path_content)) {

@file_put_contents($path_content, $htaccess_content);

if (!empty($_POST[‘save_includes’])) {

if (isset($_POST[‘wp_extra’][‘htaccess_includes’])) {

$htaccess_includes = trim(stripslashes($_POST[‘wp_extra’][‘htaccess_includes’]));

if ($htaccess_includes) {

if (!file_exists($path_includes)) {

@file_put_contents($path_includes, $htaccess_includes);

Despite being blacklisted, it is still possible to configure the .htaccess file to treat this file extension as executable, similar to a regular PHP file, enabling Remote Code Execution (RCE) to be performed.

Thanks for reading, have a nice day ​

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907