YzmCMS 3.6 allows remote attackers to discover the full path via a direct request to application/install/templates/s1.php.
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Link | Tags |
---|---|
https://github.com/kongxin520/YzmCMS/blob/master/YzmCMS_3.6_bug.md | third party advisory exploit |
https://kongxin.gitbook.io/yzmcms-3-6-bug/ | third party advisory exploit |