WordPress Plugin Vulnerabilities
Wechat Broadcast <= 1.2.0 - Local/Remote File Inclusion
Description
This bug was found in the file:
/wechat-broadcast/wechat/Image.php
echo file_get_contents(isset($_GET["url"]) ? $_GET["url"] : '');
The parameter "url" it is not sanitized allowing include local or remote
files
To exploit the vulnerability only is needed use the version 1.0 of the HTTP
protocol to interact with the application.
Proof of Concept
Affects Plugins
References
Classification
Type
LFI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Manuel García Cárdenas
Submitter
Jonas Lejon
Submitter website
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2018-09-19 (about 7 years ago)
Added
2018-09-24 (about 7 years ago)
Last Updated
2020-09-22 (about 5 years ago)