WordPress Plugin Vulnerabilities

wptf-image-gallery 1.0.3 - Remote File Download

Description

Plugin is still affected and has been closed.

The ./wptf-image-gallery/lib-mbox/ajax_load.php code doesn't sanitize user input or check that a user is authorized to download files. This allows an unauthenticated user to download sensitive system files:

1 <?php
2 error_reporting(0);
3 $homepage = file_get_contents($_GET['url']);
4 $homepage = str_replace("script", "mboxdisablescript", $homepage);
5 $homepage = str_replace("SCRIPT", "mboxdisablescript", $homepage);
6 echo $homepage;
7 ?>

Proof of Concept

Affects Plugins

References

Exploitdb

Classification

Type
LFI
OWASP top 10
CWE
CVSS

Miscellaneous

Submitter
Larry W. Cashdollar
Submitter twitter
Verified
No

Timeline

Publicly Published
2015-07-18 (about 10 years ago)
Added
2015-07-20 (about 10 years ago)
Last Updated
2020-09-22 (about 5 years ago)

Other