WordPress wp-FileManager File Download Vulnerability


Description   A vulnerability has been discovered in the wp-FileManager plugin for WordPress, which can be exploited by malicious people to disclose potentially sensitive information.
The application does not properly restrict access to wp-content/plugins/wp-filemanager/incl/libfile.php, which can be exploited to download arbitrary files via directory traversal sequences.
Successful exploitation of this vulnerability requires "Allow Download" enabled in the wp-FileManager plugin settings.
The vulnerability is confirmed in version 1.3.0. Prior versions may also be affected.
     
Vulnerable Products   Vulnerable Software:
WordPress wp-FileManager Plugin 1.x
     
Solution   Update to version 1.4.0.
     
CVE  
     
References   wp-FileManager:
http://wordpress.org/extend/plugins/wp-filemanager/changelog/
ByEge:
http://packetstormsecurity.com/files/121637/WordPress-wp-FileManager-File-Download.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2013-05-16 

 Target Type 
Server 

 Possible exploit 
Remote