Path traversal in Simple File List - #VU18618
Published: May 27, 2019 / Updated: May 27, 2019
Simple File List
Detailed vulnerability description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences passed via the "eeSFL_File" HTTP GET parameter to "/wp-content/plugins/simple-file-list/includes/ee-download.php". A remote unauthenticated attacker can send a specially crafted HTTP request and download arbitrary files from the system.