MiwoFTP - File & Folder Manager <= 1.0.4 - Arbitrary File Disclosure

Sign up to our free email alerts service for instant vulnerability notifications!

Description
A hook is added to ‘init’ in the file ‘miwoftp/miwoftp.php’. This hook is triggered whenever a user visits the front end of the site. The function specified in this hook will proceed to allow the user to download a file within the scope of the home directory of the site. Various values from the GET scope are used when specifying the path, however these values are placed into a separate array named $GLOBALS.

Affects

Plugin miwoftp
fixed in version 1.0.5

References

URL https://research.g0blin.co.uk/g0blin-00038/

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter James Hooker
Submitter Website https://research.g0blin.co.uk
Submitter Twitter g0blinResearch
Views 155
Verified No
WPVDB ID 7848

Timeline

Publicly Published 2015-03-16 (over 1 year ago)
Added 2015-03-17 (over 1 year ago)
Last Updated 2015-05-15 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.