vendor:
Simple Job Board
by:
Ven3xy
7.7
CVSS
HIGH
Local File Inclusion
22
CWE
Product Name: Simple Job Board
Affected Version From: 2.9.2003
Affected Version To: 2.9.2003
Patch Exists: YES
Related CWE: CVE-2020-35749
CPE: a:wordpress:simple_job_board
Tags: authenticated,packetstorm,wp,cve2020,lfi,wordpress,wp-plugin,wpscan,cve
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Nuclei References:
https://wpscan.com/vulnerability/eed3bd69-2faf-4bc9-915c-c36211ef9e2d, https://nvd.nist.gov/vuln/detail/CVE-2020-35749, https://docs.google.com/document/d/1TbePkrRGsczepBaJptIdVRvfRrjiC5hjGg_Vxdesw6E/edit?usp=sharing, http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html
Nuclei Metadata: {'max-request': 2, 'framework': 'wordpress', 'vendor': 'presstigers', 'product': 'simple_board_job'}
Platforms Tested: Ubuntu 20.04 LTS
2022
WordPress Plugin Simple Job Board 2.9.3 – Local File Inclusion
WordPress Plugin Simple Job Board 2.9.3 is vulnerable to a local file inclusion vulnerability. An attacker can exploit this vulnerability to gain access to sensitive files on the server. The vulnerability exists due to the lack of proper input validation in the 'action' and 'method' parameters of the 'sjb_ajax_action' AJAX action. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with the malicious 'file_path' parameter. This will allow the attacker to read any file on the server.
Mitigation:
The vendor has released a patch to address this vulnerability. Users should update to the latest version of the plugin.