Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "WordPress Advanced Access Manager < 5.9.9 - Local File Inclusion" module is designed to detect a vulnerability in the WordPress Advanced Access Manager plugin. This plugin version, prior to 5.9.9, is susceptible to a local file inclusion (LFI) vulnerability. This vulnerability allows an attacker to include local files on the server, potentially exposing sensitive information such as database credentials.
This module targets the WordPress Advanced Access Manager plugin and is classified as a high severity vulnerability. It is important to address this vulnerability promptly to prevent unauthorized access to sensitive data.
If exploited, the local file inclusion vulnerability in the WordPress Advanced Access Manager plugin can lead to unauthorized access to sensitive information stored on the server. This includes database credentials, which can be used to gain further access to the website's database and potentially compromise the entire WordPress installation.
The module works by sending a GET request to the vulnerable WordPress site with a specific parameter, "?aam-media=wp-config.php". It then checks the response body for the presence of sensitive information such as "DB_NAME" and "DB_PASSWORD". Additionally, it verifies that the response status code is 200, indicating a successful request.
If both conditions are met, the module flags the site as vulnerable to the WordPress Advanced Access Manager < 5.9.9 - Local File Inclusion vulnerability.
It is important to note that this module does not perform any modifications or exploit the vulnerability itself. It solely detects the presence of the vulnerability and reports it for further action.