Search

IQID:10115 HTTP Wordpress Ajax Store Locator Arbitrary File Download S

get in touch

Latest News

IQID:10115 HTTP Wordpress Ajax Store Locator Arbitrary File Download S

IQID: 10115 - January 2015

Ajax Store Locator Plugin for WordPress contains a flaw that allows traversing outside of a restricted path. The issue is due to the sl_file_download.php script not properly sanitizing user input, specifically path traversal style attacks (e.g. '../') supplied via the 'download_file' parameter. With a specially crafted request, a remote attacker can gain access to arbitrary files.

A Full Description is available for this threat, please sign in for access to Full Description.


 

Attack Data

Attack Data is available for this threat, please sign in for access to Attack Data.


 

CVSS Information

CVSS Information is available for this threat, please sign in for access to CVSS Information.


 

Date

Date Information is available for this threat, please sign in for access to Date Information.


 

Security Rule

A security rule is available to identify this threat, please sign in for access to security rules.


 

Permalink

Link directly to this page.

http://www.idappcom.com/db/?10115


idappcom - Auditing, verifying and enhancing the capabilities of corporate security defences.

We do not use cookies for tracking users, displaying customised content or storing information about users, other than that required to maintain 'session state' for the login system for registered users. Please read our cookie policy for more information. Please note that by using this site you are consenting to the use of cookies.