IQID:10115 HTTP Wordpress Ajax Store Locator Arbitrary File Download S

IQID: 10115 - January 2015

Ajax Store Locator Plugin for WordPress contains a flaw that allows traversing outside of a restricted path. The issue is due to the sl_file_download.php script not properly sanitizing user input, specifically path traversal style attacks (e.g. '../') supplied via the 'download_file' parameter. With a specially crafted request, a remote attacker can gain access to arbitrary files.

A Full Description is available for this threat, please sign in for access to Full Description.

Sign In

 

Attack Data

Attack Data is available for this threat, please sign in for access to Attack Data.

Sign In

 

CVSS Information

CVSS Information is available for this threat, please sign in for access to CVSS Information.

Sign In

 

Date

Date Information is available for this threat, please sign in for access to Date Information.

Sign In

 

Security Rule

A security rule is available to identify this threat, please sign in for access to security rules.


 

Permalink

Link directly to this page.

http://www.idappcom.com/db/?10115