W3 Total Cache Plugin for WordPress Multiple Insecure PHP Code Inclusion Macros Remote Code Execution

high Nessus Plugin ID 66304

Synopsis

The remote web server contains a PHP script that is affected by a remote PHP code injection vulnerability.

Description

The W3 Total Cache Plugin for WordPress installed on the remote host is affected by a remote PHP code execution vulnerability due to a failure to properly sanitize user-supplied input. An unauthenticated, remote attacker can submit a comment to a WordPress blog containing arbitrary PHP code. The blog comments can contain dynamic content that is ignored by the WordPress core, but when the cached version of the page is loaded, the code left in the comment will execute. This allow the attacker to execute arbitrary code, subject to the privileges of the web server user id.

Note that as this plugin will post comments to the site, it is recommended that the comments are removed from within the WordPress admin panel.

Solution

Upgrade to version 0.9.2.9 or later.

See Also

https://wordpress.org/support/topic/pwn3d/

http://www.nessus.org/u?30117468

https://wordpress.org/plugins/w3-total-cache/#changelog

Plugin Details

Severity: High

ID: 66304

File Name: wordpress_w3_total_cache_code_execution.nasl

Version: 1.15

Type: remote

Family: CGI abuses

Published: 5/3/2013

Updated: 6/5/2024

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Exploited by Nessus: true

Patch Publication Date: 4/17/2013

Vulnerability Publication Date: 3/21/2013

Exploitable With

Core Impact

Metasploit (WordPress W3 Total Cache PHP Code Execution)

Elliot (W3 Total Cache Plugin Remote Code Execution)

Reference Information

CVE: CVE-2013-2010

BID: 59316