CVE-2018-20638-PHP Scripts Mall Chartered Accountant : Auditor Website 2.0.1- has directory traversal


************************************************
# Exploit Title: PHP Scripts Mall Chartered Accountant : Auditor Website 2.0.1- has directory traversal via a direct request for a listing of an image directory such as an assets/ directory.
# Date: 30.12.2018
# Site Title: Find your needs on Domain Name
# Vendor Homepage: https://www.phpscriptsmall.com/
# Software Link: http://74.124.215.220/~projclient/client/auditor/
# Category: Web Application
# Version: 2.0.1
# Exploit Author: Vikas Chaudhary
# Contact: https://www.facebook.com/profile.php?id=100011287630308
# Web: https://gkaim.com/
# Tested on: Windows 10 -Firefox
# CVE-2018-20638.

***********************************************
## VENDOR SUMMARY :- PHP Scripts Mall Pvt. Ltd. is a professional software selling portal offering wide range of innovative. PHP Scripts Mall is a leading business and technology firm with 12 years of successful track record in completion and implementation of numerous projects in various
verticals and domains.. It has 300 plus PHP scripts ready to buy.

## Vulnerability Description => A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files.
*************************************************
Proof of Concept:-
————————–
1. Go to the site ( http://74.124.215.220/~projclient/client/auditor/ ) .
2- Select REGISTER page (Register now) .
3- Create an account using your Email address.
4- Now Check your Email and verify it .
5- Again come to site and login it using your verified Email and Password .
6-Spider the Host through BurpSuit and find any URL having image .Ex- http://74.124.215.220/~projclient/client/auditor/assets/images/logo.png
7-Now erase the last portion of url after last / . Ex- http://74.124.215.220/~projclient/client/auditor/assets/
you will find all the Source code and Directory of the site.
Ex- (http://74.124.215.220/~projclient/client/auditor/assets/css/bootstrap.css.)
**************************************************

Comment Please