Directory traversal vulnerability in class-simple_job_board_resume_download_handler.php in the Simple Board Job plugin 2.9.3 and earlier for WordPress allows remote attackers to read arbitrary files via the sjb_file parameter to wp-admin/post.php.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/165892/WordPress-Simple-Job-Board-2.9.3-Local-File-Inclusion.html | Exploit Third Party Advisory VDB Entry |
https://docs.google.com/document/d/1TbePkrRGsczepBaJptIdVRvfRrjiC5hjGg_Vxdesw6E/edit?usp=sharing | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/165892/WordPress-Simple-Job-Board-2.9.3-Local-File-Inclusion.html | Exploit Third Party Advisory VDB Entry |
https://docs.google.com/document/d/1TbePkrRGsczepBaJptIdVRvfRrjiC5hjGg_Vxdesw6E/edit?usp=sharing | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/161050/Simple-JobBoard-Authenticated-File-Read.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/165892/WordPress-Simple-Job-Board-2.9.3-Local-File-Inclusion.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://docs.google.com/document/d/1TbePkrRGsczepBaJptIdVRvfRrjiC5hjGg_Vxdesw6E/edit?usp=sharing - Exploit, Third Party Advisory |
Information
Published : 2021-01-15 17:15
Updated : 2024-11-21 05:28
NVD link : CVE-2020-35749
Mitre link : CVE-2020-35749
CVE.ORG link : CVE-2020-35749
JSON object : View
Products Affected
presstigers
- simple_board_job
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')