Directory traversal vulnerability in class-simple_job_board_resume_download_handler.php in the Simple Board Job plugin 2.9.3 and earlier for WordPress allows remote attackers to read arbitrary files via the sjb_file parameter to wp-admin/post.php.
References
Link | Resource |
---|---|
https://docs.google.com/document/d/1TbePkrRGsczepBaJptIdVRvfRrjiC5hjGg_Vxdesw6E/edit?usp=sharing | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/165892/WordPress-Simple-Job-Board-2.9.3-Local-File-Inclusion.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2021-01-15 09:15
Updated : 2022-02-22 02:16
NVD link : CVE-2020-35749
Mitre link : CVE-2020-35749
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
presstigers
- simple_board_job