Exploit YaPiG 0.9x - 'upload.php' Directory Traversal

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
25794
Проверка EDB
  1. Пройдено
Автор
ANONYMOUS
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2005-1884
Дата публикации
2005-06-06
Код:
source: https://www.securityfocus.com/bid/13877/info

YaPiG is prone to a directory traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An authorized user can add and delete arbitrary directories outside of the gallery directory by supplying directory traversal strings '../' to the vulnerable parameter. Exploitation of this vulnerability could lead to a loss of integrity and possibly loss of availability.

This issue is reported to affect YaPiG versions 0.92b, 0.93u and 0.94u; earlier versions may also be affected. 

Arbitrary Directory Removal:
http://www.example.com/upload.php?step=rmdir&dir=../folder

Arbitrary Directory Creation:
http://www.example.com/upload.php?step=mkdir&dir=../folder
 
Источник
www.exploit-db.com

Похожие темы