CVE-2021-4449 Scanner
CVE-2021-4449 Scanner - Unrestricted File Upload vulnerability in ZoomSounds Plugin
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
24 days 2 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
ZoomSounds is a popular audio player plugin for WordPress that allows users to upload audio tracks and manage playlists on their websites. It is commonly used by bloggers, podcasters, and musicians to enhance the audio experience on their sites. The plugin offers features such as waveform visualizations, playlist management, and customizable skins, making it versatile for audio streaming purposes.
This vulnerability in the ZoomSounds Plugin allows unauthenticated users to upload arbitrary files onto a WordPress site. Unrestricted File Upload vulnerabilities can severely compromise the security of a site as they allow attackers to execute malicious scripts or store unauthorized data. This could potentially lead to the execution of harmful code or further exploitation of the website.
The technical root of this vulnerability lies in the improper handling of file uploads by the savepng.php endpoint in the ZoomSounds Plugin. The endpoint does not adequately validate or sanitize file inputs, enabling an attacker to upload potentially dangerous files. This lack of restriction allows malicious users to exploit this loophole, potentially leading to remote code execution.
Exploiting this vulnerability can have devastating effects, including the unauthorized execution of scripts, website defacement, and data breaches. Attackers may leverage this vulnerability to gain control over the affected website, plant backdoors, or launch further attacks on connected systems or networks.
REFERENCES
- https://wpscan.com/vulnerability/07259a61-8ba9-4dd0-8d52-cc1df389c0ad
- https://codecanyon.net/item/zoomsounds-wordpress-wave-audio-player-with-playlist/6181433
- https://github.com/0xAgun/Arbitrary-File-Upload-ZoomSounds
- https://ithemes.com/blog/wordpress-vulnerability-report-june-2021-part-5/#ib-toc-anchor-2
- https://www.wordfence.com/threat-intel/vulnerabilities/id/262e3bb3-bc83-4d0b-8056-9f94ec141b8f?source=cve