The WebDorado Contact Form Builder plugin before 1.0.69 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsanitized.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://lists.openwall.net/full-disclosure/2019/04/23/1 | mailing list third party advisory exploit |
https://wordpress.org/plugins/contact-form-builder/#developers | release notes |
http://seclists.org/fulldisclosure/2019/Apr/35 | third party advisory mailing list |
https://wpvulndb.com/vulnerabilities/9260 | third party advisory |