How i found my first 0day
Title : All-in-One Video Gallery plugin <= 2.4.9 - Local File Inclusion (LFI) vulnerability
Author: m19o
Software : Wordpress 5.8.2
CVE : CVE-2021-24970
Poc : https://example/wordpress/wp-admin/admin.php?page=all-in-one-video-gallery&tab=../../../../../poc
Static analysis
At the beganinng i started to analyze the code to understand how the code works
while analyzing the dashboard.php file i saw that the developer using require_once at the end of the file, as you can see {$active_tab} gets his value from TAB and TAB value is provided by the user
Let's EXPLOIT
Exploitation
I wrote a php code to echo "Proof Of Concept" and i saved it at wordpress root directory
You can execute any file with php extension because .php is added to any value you provide
Test case
Now i will use the LFI to get reverse Shell
**Here we go, I received the connection using Netcat as a listener**