The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versions up to and including 3.2.7.
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/075a3cc5-1970-4b64-a16f-3ec97e22b606 | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/browser/simple-file-list/trunk/includes/ee-downloader.php?rev=2071880 | Patch Third Party Advisory |
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1119 | Third Party Advisory |
https://docs.google.com/document/d/1qIZXTzEpI4tO6832vk1KfsSAroT0FY2l--THlhJ8z3c/edit | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-04-19 14:15
Updated : 2022-04-27 09:32
NVD link : CVE-2022-1119
Mitre link : CVE-2022-1119
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
simplefilelist
- simple-file-list