WordPress MiwoFTP Plugin 1.0.5 CSRF Arbitrary File Creation Exploit (RCE)

Title: WordPress MiwoFTP Plugin 1.0.5 CSRF Arbitrary File Creation Exploit (RCE)
Advisory ID: ZSL-2015-5242
Type: Local/Remote
Impact: Cross-Site Scripting, System Access
Risk: (4/5)
Release Date: 14.04.2015
MiwoFTP is a smart, fast and lightweight file manager plugin that operates from the back-end of WordPress.
MiwoFTP WP Plugin suffers from a cross-site request forgery remote code execution vulnerability. The application allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests. This can be exploited to perform certain actions like executing arbitrary PHP code by uploading a malicious PHP script file, with administrative privileges, if a logged-in user visits a malicious web site.
Miwisoft LLC - http://www.miwisoft.com
Affected Version
Tested On
Apache 2.4.10 (Win32)
PHP 5.6.3
MySQL 5.6.21
Vendor Status
[24.03.2015] Vulnerability discovered.
[25.03.2015] Vendor contacted.
[25.03.2015] Vendor responds asking more details.
[26.03.2015] Sent details to the vendor.
[27.03.2015] Vendor forwarded details to developers.
[30.03.2015] Vendor confirms vulnerability scheduling patch by end of week.
[31.03.2015] Replied to the vendor.
[09.04.2015] Asked vendor for status update.
[12.04.2015] No reply from the vendor.
[13.04.2015] Asked vendor for status update.
[13.04.2015] Vendor replies promising patch by end of week.
[14.04.2015] Vendor releases version 1.0.6 to address these issues.
[14.04.2015] Coordinated public security advisory released.
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>
[1] http://miwisoft.com/wordpress-plugins/miwoftp-wordpress-file-manager#changelog
[2] http://www.exploit-db.com/exploits/36763/
[3] http://cxsecurity.com/issue/WLB-2015040072
[4] http://packetstormsecurity.com/files/131436
[5] http://osvdb.org/show/osvdb/120791
[6] https://exchange.xforce.ibmcloud.com/vulnerabilities/102417
[7] https://wpvulndb.com/vulnerabilities/7905
[8] https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/miwoftp/miwoftp-106-cross-site-request-forgery-leading-to-remote-code-execution
[14.04.2015] - Initial release
[16.04.2015] - Added reference [2], [3], [4] and [5]
[20.04.2015] - Added reference [6]
[21.06.2015] - Added reference [7]
[16.12.2022] - Added reference [8]
Zero Science Lab

Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk