MiwoFTP - File & Folder Manager 1.0.4, Arbitrary File Disclosure

A hook is added to ‘init’ in the file ‘miwoftp/miwoftp.php’. This hook is triggered whenever a user visits the front end of the site. The function specified in this hook will proceed to allow the user to download a file within the scope of the home directory of the site. Various values from the GET scope are used when specifying the path, however these values are placed into a separate array named $GLOBALS.

Homepage

https://wordpress.org/plugins/miwoftp/

CVSS Score

5

CSSS Vector

(AV:N/AC:L/Au:N/C:P/I:N/A:N)

Attack Scope

remote

Authorization Required

None

Mitigation

Update to version 1.0.5.

Proof of Concept

The following URL, when visited on a vulnerable installation by an Anonymous user will result in disclosure of the ‘wp-config.php’ file. This may lead to disclosure of DB or FTP credentials, which in a worse case scenario could lead to further access.

http://localhost/?action=download&option=com_miwoftp&item=wp-config.php

Timeline

  • 2015-03-09: Discovered
  • 2015-03-09: Vendor notified
  • 2015-03-09: Vendor responded
  • 2015-03-09: Version 1.0.5 released – issue resolved