#VU18618 Path traversal in Simple File List
Published: May 27, 2019 / Updated: May 27, 2019
Simple File List
Mitchell Bennis - Element Engage, LLC
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences passed via the "eeSFL_File" HTTP GET parameter to "/wp-content/plugins/simple-file-list/includes/ee-download.php". A remote unauthenticated attacker can send a specially crafted HTTP request and download arbitrary files from the system.