WordPress Plugin Vulnerabilities

Contact Forms - Drag & Drop Contact Form Builder <= 1.0.5 - Admin+ Arbitrary System File Read

Description

The plugin allows high privilege users to download arbitrary files from the web server via a path traversal attack

Proof of Concept

1) Create a new form with a file upload field.
2) Upload a file to the form created.
3) View the submission in the "All submissions" page and click "Show"
3) Under "File Attachments" you should see the file you uploaded
4) Right-click on the file and copy the url
5) Now paste the url in a new window
6) Change the "&file=" content from the file you uploaded to "../../../../../../../../../../../etc/passwd"
7) The browser will be prompted to download the file.

Affects Plugins

No known fix

References

Classification

Type
TRAVERSAL
OWASP top 10
CWE

Miscellaneous

Original Researcher
Davide Taraschi
Submitter
Davide Taraschi
Submitter website
Verified
Yes

Timeline

Publicly Published
2021-09-27 (about 2 years ago)
Added
2022-01-26 (about 2 years ago)
Last Updated
2022-04-13 (about 2 years ago)

Other