WordPress Slider Revolution Local File Disclosure

By
Jijith Rajan
Published on
26 Apr 2022
Vulnerability

The older versions of WordPress plugin Slider Revolution is vulnerable to file disclosure vulnerability. This vulnerability allows an attacker to download any file from the server remotely. This vulnerability will allow the attackers to steal the database credentials. This information from the server will compromise the website. Full Path Disclosure vulnerability enables the attacker to view and access the path to the webroot/file.

Example

The result from the following php code determine, if this web application has disclosure vulnerability:-

      <?php
         echo file_get_contents(getcwd().$_GET['page']);
      ?>

   

Impact

Using this attack, an attacker can:-

  • steal sensitive information.
  • get the access to the source code.
  • get complete access to the database.

Mitigation / Precaution

Automated human-like penetration testing for your web apps & APIs
Teams using Beagle Security are set up in minutes, embrace release-based CI/CD security testing and save up to 65% with timely remediation of vulnerabilities. Sign up for a free account to see what it can do for you.

Written by
Jijith Rajan
Jijith Rajan
Cyber Security Engineer
Experience the Beagle Security platform
Unlock one full penetration test and all Advanced plan features free for 10 days
Find surface-level website security issues in under a minute
Free website security assessment
Experience the power of automated penetration testing & contextual reporting.