WP Super Cache Plugin for WordPress Multiple Insecure PHP Code Inclusion Macros Remote Code Execution

high Nessus Plugin ID 66305

Synopsis

The remote web server contains a PHP script that is affected by a remote PHP code injection vulnerability.

Description

The WP Super Cache Plugin for WordPress installed on the remote host is affected by a remote PHP code execution vulnerability due to a failure to properly sanitize user-supplied input. An unauthenticated, remote attacker can submit a comment to a WordPress blog containing arbitrary PHP code. The blog comments can contain dynamic content that is ignored by the WordPress core, but when the cached version of the page is loaded, the code left in the comment will execute. This allows the attacker to execute arbitrary code, subject to the privileges of the web server user id.

This issue exists because of an incomplete fix for CVE-2013-2009.

Note that the plugin is reportedly also affected by a cross-site scripting vulnerability; however, Nessus has not tested for this issue.

Also note that this plugin will post comments to the site, and it is recommended that the comments are removed from within the WordPress admin panel.

Solution

Upgrade to version 1.3.2 or later.

See Also

https://wordpress.org/support/topic/pwn3d/

http://www.nessus.org/u?30117468

https://wordpress.org/plugins/wp-super-cache/#changelog

Plugin Details

Severity: High

ID: 66305

File Name: wordpress_wp_super_cache_code_execution.nasl

Version: 1.10

Type: remote

Family: CGI abuses

Published: 5/3/2013

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 4/24/2013

Vulnerability Publication Date: 3/21/2013

Reference Information

CVE: CVE-2013-2009, CVE-2013-2011

BID: 59470, 59473, 59493