Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

WordPress Advanced Access Manager < 5.9.9 - Local File Inclusion

By kannthu

High
Vidoc logoVidoc Module
#wordpress#wp-plugin#lfi#wp#accessmanager
Description

What is the "WordPress Advanced Access Manager < 5.9.9 - Local File Inclusion?"

The "WordPress Advanced Access Manager < 5.9.9 - Local File Inclusion" module is designed to detect a vulnerability in the WordPress Advanced Access Manager plugin. This plugin version, prior to 5.9.9, is susceptible to a local file inclusion (LFI) vulnerability. This vulnerability allows an attacker to include local files on the server, potentially exposing sensitive information such as database credentials.

This module targets the WordPress Advanced Access Manager plugin and is classified as a high severity vulnerability. It is important to address this vulnerability promptly to prevent unauthorized access to sensitive data.

Impact

If exploited, the local file inclusion vulnerability in the WordPress Advanced Access Manager plugin can lead to unauthorized access to sensitive information stored on the server. This includes database credentials, which can be used to gain further access to the website's database and potentially compromise the entire WordPress installation.

How the module works?

The module works by sending a GET request to the vulnerable WordPress site with a specific parameter, "?aam-media=wp-config.php". It then checks the response body for the presence of sensitive information such as "DB_NAME" and "DB_PASSWORD". Additionally, it verifies that the response status code is 200, indicating a successful request.

If both conditions are met, the module flags the site as vulnerable to the WordPress Advanced Access Manager < 5.9.9 - Local File Inclusion vulnerability.

It is important to note that this module does not perform any modifications or exploit the vulnerability itself. It solely detects the presence of the vulnerability and reports it for further action.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/?aam-media=wp-confi...
Matching conditions
word: DB_NAME, DB_PASSWORDand
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability