Thepeak File Upload v1.3 : Read file vulneability

Risk: High
Local: No
Remote: Yes
CWE: CWE-Other

CVSS Base Score: 7.5/10
Impact Subscore: 6.4/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Thepeak File Upload v1.3 : Read file vulneability Discovered By: Phạm Đức Hải (Pham Duc Hai) Email: duchaikhtn (at) gmail (dot) com YIM : kiki_coco1985vn Website: ------------------------- Description: file upload manager 1.3 written by thepeak (adam medici) copyright (c) 2003 thepeak of A simple, powerful tool to upload and manage files using your web browser. There are some bugs in Thepeak File Upload v1.3 : Today, I find out a bug in Thepeak File Upload v1.3 , this bug allows attacker can download source file(.php,...) from server. ------------------------- Exploit : --> upload form Now, we upload one file to server, ex : test.jpg -->ok We have its url to view it : anh url to download it : Notice that the value "dGVzdC5qcGc=" of parameter file is encoded 64 of " test.jpg" We need get source file Encode 64 path to index.php above : ../index.php --> Li4vaW5kZXgucGhw ==> we have the link to download source file index.php (notice act=dl) You can also download other files. Have fun!

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top