vendor:
Mailz
by:
6Scan security team
8.8
CVSS
HIGH
Arbitrary File Download
434
CWE
Product Name: Mailz
Affected Version From: < 1.4.2
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: a:zingiri:mailz
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
Mailing List plugin for WordPress Arbitrary file download
Unauthorized users can download arbitrary files from the server using this exploit. The bug is in config.php, but accessible from other file. The PoC involves setting up a MySQL database, creating a table with a specific structure, adding a raw into the database, and calling the script with database parameters and file id to download.
Mitigation:
Update to version 1.4.2 or later