WordPress MiwoFTP Plugin 1.0.5 CSRF Arbitrary File Deletion Exploit

Title: WordPress MiwoFTP Plugin 1.0.5 CSRF Arbitrary File Deletion Exploit
Advisory ID: ZSL-2015-5240
Type: Local/Remote
Impact: Cross-Site Scripting, Manipulation of Data
Risk: (3/5)
Release Date: 14.04.2015
MiwoFTP is a smart, fast and lightweight file manager plugin that operates from the back-end of WordPress.
Input passed to the 'selitems[]' parameter is not properly sanitised before being used to delete files. This can be exploited to delete files with the permissions of the web server using directory traversal sequences passed within the affected POST parameter.
Miwisoft LLC - http://www.miwisoft.com
Affected Version
Tested On
Apache 2.4.10 (Win32)
PHP 5.6.3
MySQL 5.6.21
Vendor Status
[24.03.2015] Vulnerability discovered.
[25.03.2015] Vendor contacted.
[25.03.2015] Vendor responds asking more details.
[26.03.2015] Sent details to the vendor.
[27.03.2015] Vendor forwarded details to developers.
[30.03.2015] Vendor confirms vulnerability scheduling patch by end of week.
[31.03.2015] Replied to the vendor.
[09.04.2015] Asked vendor for status update.
[12.04.2015] No reply from the vendor.
[13.04.2015] Asked vendor for status update.
[13.04.2015] Vendor replies promising patch by end of week.
[14.04.2015] Vendor releases version 1.0.6 to address these issues.
[14.04.2015] Coordinated public security advisory released.
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
[1] http://miwisoft.com/wordpress-plugins/miwoftp-wordpress-file-manager#changelog
[2] http://www.exploit-db.com/exploits/36761/
[3] http://cxsecurity.com/issue/WLB-2015040070
[4] http://packetstormsecurity.com/files/131434
[5] http://osvdb.org/show/osvdb/120797
[6] https://exchange.xforce.ibmcloud.com/vulnerabilities/102402
[7] https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/miwoftp/miwoftp-106-cross-site-request-forgery-to-arbitrary-file-deletion
[14.04.2015] - Initial release
[16.04.2015] - Added reference [2], [3], [4], [5] and [6]
[16.12.2022] - Added reference [7]
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk