WordPress SOME bug in plupload.flash.swf

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

WordPress SOME bug in plupload.flash.swf ### Intro WordPress 4.5.1 is vulnerable against a Same-Origin Method Execution (SOME) vulnerability that stems from an insecure URL sanitization process performed in the file plupload.flash.swf. The code in the file attempts to remove flashVars ¹ in case they have been set GET parameters but fails to do so, enabling XSS via ExternalInterface ². The attack technique was first described by Soroush Dalili in 2013 ³. The vulnerability in plupload.flash.swf was discovered in April 2016, first identified as SOME⁴ bug by Kinugawa. Then, after a team review, the full exploitation potential was discovered and analyzed by Heiderich, Filedescriptor, Kinugawa and Inführ. Finally, it was discovered, that this file comes packaged with latest WordPress and the issue was reported via HackerOne by Heiderich et al. Simple PoC: ``` http://example.com//wp-includes/js/plupload/plupload.flash.swf?target%g=alert&uid%g=hello& ``` A more complex PoC was created to...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息