.. / CVE-2008-1059

Exploit for WordPress Sniplets 1.1.2 - Local File Inclusion (CVE-2008-1059)

Description:

PHP remote file inclusion vulnerability in modules/syntax_highlight.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via a URL in the libpath parameter.

Nuclei Template

View the template here CVE-2008-1059.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2008/CVE-2008-1059.yaml
Copy

References:

https://nvd.nist.gov/vuln/detail/CVE-2008-1059
http://securityreason.com/securityalert/3706
https://exchange.xforce.ibmcloud.com/vulnerabilities/40829
https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
https://www.exploit-db.com/exploits/5194