
13 changes to exploits/shellcodes/ghdb TELSAT marKoni FM Transmitter 1.9.5 - Backdoor Account Information Disclosure TELSAT marKoni FM Transmitter 1.9.5 - Insecure Access Control Change Password TELSAT marKoni FM Transmitter 1.9.5 - Root Command Injection Atlassian Confluence < 8.5.3 - Remote Code Execution Backdrop CMS 1.23.0 - Stored XSS Gibbon LMS < v26.0.00 - Authenticated RCE Quick.CMS 6.7 - SQL Injection Login Bypass TYPO3 11.5.24 - Path Traversal (Authenticated) WEBIGniter v28.7.23 - Stored XSS WordPress File Upload Plugin < 4.23.3 - Stored XSS xbtitFM 4.1.18 - Multiple Vulnerabilities ZoneMinder Snapshots < 1.37.33 - Unauthenticated RCE
25 lines
No EOL
1.1 KiB
Text
25 lines
No EOL
1.1 KiB
Text
# Exploit Title: TYPO3 11.5.24 Path Traversal Vulnerability (Authenticated)
|
|
# Date: Apr 9, 2023
|
|
# Exploit Author: Saeed reza Zamanian
|
|
# Software Link: https://get.typo3.org/release-notes/11.5.24
|
|
# Version: 11.5.24
|
|
# Tested on: Kali 2022.3
|
|
# CVE : CVE-2023-30451
|
|
|
|
|
|
In TYPO3 11.5.24, the filelist component allows attackers (with access to the administrator panel),
|
|
to read arbitrary files by utilizing a directory traversal via the baseuri field, This is demonstrated through :
|
|
POST /typo3/record/edit with ../../../ and the parameter
|
|
data[sys_file_storage]*[data][sDEF][lDEF][basePath][vDEF].
|
|
|
|
-----------------------------------------------------
|
|
To exploit this vulnerability, follow these steps:
|
|
|
|
1. Log in to the administrator panel.
|
|
2. Navigate to 'file' > 'Filelist' section.
|
|
3. Right-click on a file storage and select 'New.'
|
|
4. Set the base URI to "../../../" and save.
|
|
|
|
After creating the file storage, the final HTTP request should resemble the one below. Once the file storage is created, refresh the page, enabling you to browse any directory on the server.
|
|
|
|
To access "/etc/passwd," browse to the '/etc/' directory, search for 'passwd,' and view the file. |