Wordpress plugin contact form builder 1.0.67 crosssite request forgery / local file inclusion Vulnerability / Exploit
/
/
/
Exploits / Vulnerability Discovered : 2019-04-22 |
Type : webapps |
Platform : php
This exploit / vulnerability Wordpress plugin contact form builder 1.0.67 crosssite request forgery / local file inclusion is for educational purposes only and if it is used you will do on your own risk!
All of them call the function `contact_form_maker_ajax`. This function
dynamicaly loads a file defined in `$_GET['action']` or
`$_POST['action']` if the former is not defined. Because of the way
WordPress defines the AJAX action a user could define the plugin action
in the `$_GET['action']` and AJAX action in `$_POST['action']`.
Leveraging that and the fact that no sanitization is performed on the
`$_GET['action']`, a malicious actor can perform a CSRF attack to load a
file using directory traversal thus leading to Local File Inclusion
vulnerability.