WordPress Plugin Vulnerabilities
Directorist < 7.5.4 - Admin+ LFI
Description
The plugin is vulnerable to Local File Inclusion as it does not validate the file parameter when importing CSV files.
Proof of Concept
This PoC will work on Linux systems. 1. Navigate to the URL path: /wp-admin/edit.php?post_type=at_biz_dir&page=tools&step=2&file=/etc/passwd&delimiter=; 2.. You will be presented with the first couple lines of the /etc/passwd file 3. In the "map to field" section, select "Title" and click "Run Importer" 6. You will then be presented with a bunch of "pending" listings, with the title for each listing presenting a new line of content from the `/etc/passwd` file
Affects Plugins
References
CVE
Classification
Type
LFI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
rSolutions Security Team
Submitter
rSolutions Security Team
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-05-10 (about 1 years ago)
Added
2023-05-10 (about 1 years ago)
Last Updated
2023-05-10 (about 1 years ago)