vendor:
Image-Export
by:
AMAR^SHG
7,5
CVSS
HIGH
Local File Disclosure
200
CWE
Product Name: Image-Export
Affected Version From: All versions
Affected Version To: All versions
Patch Exists: Yes
Related CWE: N/A
CPE: a:1efthander:image-export
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows/Unix
2016
WordPress image-export LFD
The download.php file in the Wordpress image-export plugin is vulnerable to a Local File Disclosure vulnerability. An attacker can use the 'file' GET parameter to access any file on the server, including the Wordpress core. This can be exploited by sending a request to the download.php file with the 'file' parameter set to the path of the file to be accessed, such as '../../../wp-config.php'.
Mitigation:
Update to the latest version of the plugin.