vendor:
Memphis Documents Library
by:
Felipe Molina
7,5
CVSS
HIGH
Arbitrary File Download
434
CWE
Product Name: Memphis Documents Library
Affected Version From: 2.3
Affected Version To: 3.1.5
Patch Exists: YES
Related CWE: N/A
CPE: a:wordpress:memphis_documents_library
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 12.04, Wordpress 4.4.2
2016
Arbitrary file download in Memphis Document Library 3.1.5
Memphis Document Library 3.1.5 is vulnerable to arbitrary file download. The vulnerable file is mdocs-downloads.php and the vulnerable function is mdocs_img_preview(). The vulnerable GET parameter is injectable 'mdocs-img-preview'. The vulnerable code is from line 90 to 93. The POC is to use curl to download the file from the server. If the plugin is not installed in the root folder of wordpress, the POC is to use curl to download the file from the folder 'mdocs-posts'.
Mitigation:
Upgrade to the latest version of Memphis Document Library (3.1.6 or higher)