Sell Downloads 1.0.1, Arbitrary File Disclosure
Due to the lack of sanitation of of user input, it is possible to download arbitrary files from site, under the context of the web server. This could lead to disclosure of server configuration, or other sensitive information.
Homepage
https://wordpress.org/plugins/sell-downloads/
CVSS Score
5
CSSS Vector
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Attack Scope
remote
Authorization Required
None
Mitigation
Update to version 1.0.2.
Proof of Concept
Once the plugin is activated, an arbitrary file can be downloading using a simple GET request. Below are a couple of examples The vulnerable parameter is ‘file’, and will accept either an absolute file path, or a file path relative to the root of the WordPress site.
http://localhost/?sd_action=demo&file=/etc/passwd
http://localhost/?sd_action=demo&file=wp-config.php
Timeline
- 2014-12-19: Discovered
- 2014-12-19: Vendor notified
- 2014-12-19: Vendor replied
- 2014-12-19: 1.0.2. released – issue resolved
- 2014-12-29: Advisory released
- 2015-01-05: CVE Requested
- 2015-01-05: CVE Assigned