GetSimple CMS "set" Local File Inclusion Vulnerability
Description
AutoSec Tools has discovered a vulnerability in GetSimple CMS, which can be exploited by malicious people to disclose sensitive information.
Input passed via the "set" parameter to index.php is not properly verified before being used in admin/inc/plugin_functions.php. This can be exploited to include arbitrary files from local resources via directory traversal sequences.
The vulnerability is confirmed in version 3.0. Prior versions may also be affected.