# Hash Form 1.1.0 任意文件上传漏洞
## 概述
Hash Form – Drag & Drop Form Builder插件中的`file_upload_action`函数缺少文件类型验证,导致任意文件上传漏洞。
## 影响版本
所有版本,包括1.1.0版本及其以下版本。
## 细节
该漏洞存在于`file_upload_action`函数中,未对上传的文件类型进行验证,从而使未认证的攻击者能够上传任意文件到服务器。
## 影响
攻击者可以上传文件并可能执行远程代码。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution | https://github.com/KTN1990/CVE-2024-5084 | POC详情 |
2 | Hash Form – Drag & Drop Form Builder <= 1.1.0 - Unauthenticated Arbitrary File Upload to Remote Code Execution | https://github.com/Chocapikk/CVE-2024-5084 | POC详情 |
3 | None | https://github.com/k3lpi3b4nsh33/CVE-2024-5084 | POC详情 |
4 | PoC Exploit for CVE-2024-5084 | https://github.com/WOOOOONG/CVE-2024-5084 | POC详情 |
5 | Материалы для научной работы | https://github.com/z1gazaga/CVE-2024-5084 | POC详情 |
6 | None | https://github.com/Raeezrbr/CVE-2024-5084 | POC详情 |
7 | None | https://github.com/ModeBrutal/CVE-2024-5084-Auto-Exploit | POC详情 |
8 | The Hash Form Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-5084.yaml | POC详情 |
9 | None | https://github.com/NanoWraith/CVE-2024-5084 | POC详情 |
暂无评论