vendor:
Mail Masta
by:
Guillermo Garcia Marcos
7,5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Mail Masta
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2016
Mail Masta WP Local File Inclusion
The File Inclusion vulnerability allows an attacker to include a file, usually exploiting a 'dynamic file inclusion' mechanisms implemented in the target application. The vulnerability occurs due to the use of user-supplied input without proper validation. Typical proof-of-concept would be to load passwd file: http://server/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd
Mitigation:
Input validation should be used to prevent the inclusion of malicious files.