Rapid7 Vulnerability & Exploit Database

WordPress Plugin Google Document Embedder Arbitrary File Disclosure

Back to Search

WordPress Plugin Google Document Embedder Arbitrary File Disclosure

Disclosed
01/03/2013
Created
05/30/2018

Description

This module exploits an arbitrary file disclosure flaw in the WordPress blogging software plugin known as Google Document Embedder. The vulnerability allows for database credential disclosure via the /libs/pdf.php script. The Google Document Embedder plug-in versions 2.4.6 and below are vulnerable. This exploit only works when the MySQL server is exposed on an accessible IP and WordPress has filesystem write access. Please note: The admin password may get changed if the exploit does not run to the end.

Author(s)

  • Charlie Eriksen

Platform

PHP

Architectures

php

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/unix/webapp/wp_google_document_embedder_exec
msf exploit(wp_google_document_embedder_exec) > show targets
    ...targets...
msf exploit(wp_google_document_embedder_exec) > set TARGET < target-id >
msf exploit(wp_google_document_embedder_exec) > show options
    ...show and set options...
msf exploit(wp_google_document_embedder_exec) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;