Software: Ajax Pagination (twitter Style)
CVSS: 9.3 (High; AV:N/AC:M/Au:N/C:C/I:C/A:C)
End-user exploitable local file inclusion vulnerability in Ajax
Pagination (twitter Style) 1.1
This plugin contains a file inclusion vulnerability that is exploitable
by an unauthenticated user. The user can include any local file ending
in .php which is accessible to the web user.
Proof of concept
A non-logged in user can call the ajax function
wp_ajax_nopriv_ajax_navigation that calls ajax_navigation_callback in
ajax-pagination-front.php at line 75.
By setting the value of loop in the POST data, they can include the
contents of that path on the returned page.
For example, to include the contents of wp-login.php in the returned
page, send the following:
POST /wordpress/wp-admin/admin-ajax.php HTTP/1.1
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Disable the plugin until a fix is available.
dxw believes in responsible disclosure. Your attention is drawn to our
disclosure policy: https://security.dxw.com/disclosure/
Please contact us on firstname.lastname@example.org to acknowledge this report if you
received it via a third party (for example, email@example.com) as
they generally cannot communicate with us on your behalf.
Please note that this vulnerability will be published if we do not
receive a response to this report with 14 days.
2014-02-18: Reported to firstname.lastname@example.org and email@example.com
2014-03-28: No response received to reports. Vulnerability published.
Discovered by dxw:
Please visit security.dxw.com for more information.