师说CMS Directory traversal Vulnerability

2016.12.30
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |=============================================================| |[+] Exploit Title : Directory traversal Vulnerability in 师说CMS |[+] |[+] Exploit Author: Ashiyane Digital Security Team |[+] |[+] Vendor : https://github.com/northyoung/cms |[+] |[+] Tested on: Kali Linux |[+] |[+] Date: 12 /29 / 2016 |=============================================================| |[+] Vuln Path : http://127.0.0.1/cms-master/cms/src/main/webapp/upload/../WEB-INF/web.xml? |[+] Method :GET |=============================================================| |[+] Vulnerability description |==============================| |[+] This script is possibly vulnerable to directory traversal attacks. |[+] Directory Traversal is a vulnerability which allows attackers to access restricted |[+] directories and execute commands outside of the web server's root directory. |[+] This vulnerability affects /cms-master/cms/src/main/webapp/upload. |[+] Discovered by: Scripting (Server_Directory_Traversal.script). |[+] Attack details |[+] This file was found using the pattern ${dirName}/../WEB-INF/web.xml?. |[+] Original directory: /cms-master/cms/src/main/webapp/upload |[+] |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*| |[+] Discovered By : M.R.S.L.Y |*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top