WordPress Zingiri Forum Plugin "url" Arbitrary File Disclosure Vulnerability
Description
Charlie Eriksen has discovered a vulnerability in the Zingiri Forum plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.
Input passed via the "url" parameter to e.g. index.php (when "zforum" is set to "css") is not properly verified in the "zing_forum_output()" function (wp-content/plugins/zingiri-forum/forum.php) before being used to read files. This can be exploited to disclose the content of arbitrary files via directory traversal sequences.
The vulnerability is confirmed in version 1.4.2. Other versions may also be affected.
Vulnerable Products
Vulnerable Software: WordPress Zingiri Forum Plugin 1.x