Path Traversal in admin/download.php in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to download files from the server using a dot-dot-slash sequence (../) via the GET parameter file.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://antoniocannito.it/?p=137#afd | third party advisory exploit |
http://packetstormsecurity.com/files/156754/PHPKB-Multi-Language-9-Authenticated-Directory-Traversal.html | vdb entry third party advisory |
https://www.exploit-db.com/exploits/48220 | vdb entry third party advisory |
https://antoniocannito.it/phpkb1#authenticated-arbitrary-file-download-cve-2020-10387 | third party advisory exploit |