Wordpress plugin wp security audit log 3.1.1 sensitive information disclosure Vulnerability / Exploit

  /     /     /  

Exploits / Vulnerability Discovered : 2018-03-30 | Type : webapps | Platform : php
This exploit / vulnerability Wordpress plugin wp security audit log 3.1.1 sensitive information disclosure is for educational purposes only and if it is used you will do on your own risk!


[+] Code ...

# Exploit Title: WP Security Audit Log Plugin, Sensitive Information Disclosure <= 3.1.1
# Google Dork: inurl:/wp-content/uploads/wp-security-audit-log/
# Date: 3/13/2018
# Exploit Author: Colette Chamberland, Defiant, Inc.
# Vendor Homepage: http://wpwhitesecurity.com
# Software Link: https://wordpress.org/plugins/wp-security-audit-log/
# Version: <=3.1.1
# Tested on: Wordpress 4.9.x
# CVE : CVE-2018-8719

Description:
No protection on the wp-content/uploads/wp-security-audit-log/*
which is indexed by google and allows for attackers to possibly find user information (bad login attempts)

/wp-security-audit-log/classes/Sensors/System.php':
$upload_dir = wp_upload_dir();
$uploads_dir_path = trailingslashit( $upload_dir['basedir'] ) . 'wp-security-audit-log/404s/users/';
$uploads_url = trailingslashit( $upload_dir['baseurl'] ) . 'wp-security-audit-log/404s/users/';

/wp-security-audit-log/classes/Sensors/LogInOut.php':
// Directory for logged in users log files.
$user_upload_dir = wp_upload_dir();
$user_upload_path = trailingslashit( $user_upload_dir['basedir'] . '/wp-security-audit-log/failed-logins/' );
if ( ! $this->CheckDirectory( $user_upload_path ) ) {
wp_mkdir_p( $user_upload_path );
}