漏洞描述
WordPress Plugin Duplicate Page files are publicly accessible without ABSPATH protection, exposing sensitive server path information through PHP error messages when accessed directly.
id: wp-duplicate-page-fpd
info:
name: WordPress Duplicate Page - Full Path Disclosure
author: DhiyaneshDk
severity: low
description: |
WordPress Plugin Duplicate Page files are publicly accessible without ABSPATH protection, exposing sensitive server path information through PHP error messages when accessed directly.
reference:
- https://wordpress.org/plugins/duplicate-page/
metadata:
verified: true
max-request: 1
publicwww-query: "/plugins/duplicate-page"
tags: wp,wordpress,wp-plugin,fpd,duplicate-page,misconfig
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/duplicate-page/duplicatepage.php"
matchers:
- type: dsl
dsl:
- 'contains_all(body, "Fatal error", "Uncaught Error") || contains_all(body, "Warning:", "failed to open stream")'
- 'status_code == 200 || status_code == 500'
- 'contains(body, "duplicate-page")'
condition: and
# digest: 4b0a00483046022100d3786110d9309751c699fd5ccb7f94fca20e4a48b73f2cfe0e66ae09383e48c7022100e0b1a4c78f3f14de6b228d9417e2eecdb0bbc1421bdccecdfefaaa6518de5fbf:922c64590222798bb761d5b6d8e72950