DOS vulnerability
-
Hi,
Reading the code of your plugin, I think you have a DOS vulnerability. An unauthenticated, not-logged-in user can make calls to tux_handle_upload.php directly. That file performs no authentication, and will write as much attacker-controlled data to disk as requested to, until the disk is completely filled.
The plupload URL shouldn’t point directly to a script that performs no authentication like that – it should point to admin-ajax.php, and use WP’s authentication system to ensure that the uploader is a logged-in, authorised user. See in UpdraftPlus (updraftplus/admin.php) for an example.
David
https://www.ads-software.com/plugins/tuxedo-big-file-uploads/
- The topic ‘DOS vulnerability’ is closed to new replies.