Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "Wordpress Aspose Cloud eBook Generator - Local File Inclusion" module is designed to detect a vulnerability in the Wordpress Aspose Cloud eBook Generator plugin. This vulnerability allows an attacker to include local files from the server by exploiting a file inclusion vulnerability in the plugin. The severity of this vulnerability is classified as high.
If successfully exploited, this vulnerability can lead to unauthorized access to sensitive files on the server. An attacker could potentially gain access to database credentials, such as the database name and password, which can be used for further attacks or unauthorized access to the website.
The module sends a GET request to the vulnerable endpoint:
/wp-content/plugins/aspose-cloud-ebook-generator/aspose_posts_exporter_download.php?file=../../../wp-config.php
The module then checks the response body for the presence of specific keywords, such as "DB_NAME" and "DB_PASSWORD", indicating that the wp-config.php file has been successfully included. Additionally, it verifies that the response status code is 200, confirming that the file inclusion was successful.
If both conditions are met, the module reports a vulnerability, indicating that the Wordpress Aspose Cloud eBook Generator plugin is vulnerable to local file inclusion.
Note: It is important to promptly update the plugin to the latest version or apply any available patches to mitigate this vulnerability.