WordPress Slider Revolution Local File Disclosure

By
Jijith Rajan
Published on
26 Apr 2022

The older versions of WordPress plugin Slider Revolution is vulnerable to file disclosure vulnerability. This vulnerability allows an attacker to download any file from the server remotely. This vulnerability will allow the attackers to steal the database credentials. This information from the server will compromise the website. Full Path Disclosure vulnerability enables the attacker to view and access the path to the webroot/file.

Example

The result from the following php code determine, if this web application has disclosure vulnerability:-

      <?php
         echo file_get_contents(getcwd().$_GET['page']);
      ?>

   

Impact

Using this attack, an attacker can:-

  • steal sensitive information.
  • get the access to the source code.
  • get complete access to the database.

Mitigation / Precaution

Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Jijith Rajan
Jijith Rajan
Cyber Security Engineer
Find website security issues in a flash
Improve your website's security posture with proactive vulnerability detection.
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.