CMSimple 5.16 allows the user to read cms source code through manipulation of the file name in the file parameter of a GET request.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/h4ckr4v3n/cmsimple5.16_research/blob/main/CMSimple%205.16%20Sensitive%20information%20disclosure.md | third party advisory exploit |
https://gist.github.com/h4ckr4v3n/afbb87b5a05f283dbee705709c2769eb | third party advisory |