Summary
This host is installed with WordPress
Ajax Store Locator Plugin and is prone to directory traversal vulnerability.
Impact
Successful exploitation will allow
attacker to read arbitrary files on the target system.
Impact Level: System/Application
Solution
No solution or patch is available as of
20th February, 2015. Information regarding this issue will updated once the solution details are available. For updates refer to http://codecanyon.net/item/ajax-store-locator-wordpress/5293356
Insight
Input passed via the 'download_file'
parameter to the sl_file_download.php script is not properly sanitized before being returned to the user.
Affected
WordPress Ajax Store Locator version 1.2
and prior.
Detection
Send a crafted data via HTTP GET
request and check whether it is possible to read a local file
References
Updated on 2015-03-25