WordPress Plugin Vulnerabilities
Memphis Document Library Plugin <= 3.1.5 - Arbitrary File Download
Description
The function "mdocs_img_preview" is in charge of downloading image previews previously uploaded by the administrator, but it does not sanitize the file path being downloaded, thus, allowing to download arbitrary files in the file system.
The vulnerable GET parameter is "mdocs-img-preview".
The vulnerable code is in lines 90 to 93 of file "memphis-documents-library/mdocs-downloads.php":
87 function mdocs_img_preview() {
88 require_once(ABSPATH . 'wp-includes/pluggable.php');
89 $upload_dir = wp_upload_dir();
90 $image = $upload_dir['basedir'].MDOCS_DIR.$_GET['mdocs-img-preview'];
91 $content = file_get_contents($image);
92 header('Content-Type: image/jpeg');
93 echo $content; exit();
94 }
Proof of Concept
Affects Plugins
References
Exploitdb
Miscellaneous
Submitter
Felipe Molina
Submitter twitter
Verified
No
WPVDB ID
Timeline
Publicly Published
2016-03-22 (about 9 years ago)
Added
2016-03-22 (about 9 years ago)
Last Updated
2019-10-31 (about 6 years ago)