Gxlcms uses an unsafe character-replacement approach in an attempt to restrict access, which allows remote attackers to read arbitrary files via modified pathnames in the s parameter to index.php, related to Lib/Admin/Action/TplAction.class.php and Lib/Admin/Common/function.php.
Link | Tags |
---|---|
https://github.com/Blck4/blck4/blob/master/Gxlcms%20POC.php | third party advisory exploit |