Home > CVE > CVE-2018-20646-HP Scripts Mall Basic B2B Script 2.0.9 has directory traversal Vulnerability

CVE-2018-20646-HP Scripts Mall Basic B2B Script 2.0.9 has directory traversal Vulnerability

CVE-2018-20646-vikas-chaudhary

************************************************
# Exploit Title: PHP Scripts Mall Basic B2B Script 2.0.9 has directory traversal via a direct request for a listing of an image directory such as an uploads/ directory.
# Date: 30.12.2018
# Site Title : B2B Script
# Vendor Homepage: https://www.phpscriptsmall.com/
#Vendor Software : https://www.phpscriptsmall.com/product/professional-b2b-script/
# Software Link: http://readymadeb2bscript.com/basic-b2b/
# Category: Web Application
# Version: 2.0.9
# Exploit Author: Vikas Chaudhary
# Contact: https://www.facebook.com/profile.php?id=100011287630308
# Web: https://gkaim.com/
# Tested on: Windows 10 -Firefox
# CVE-2018-20646.
*********************************************

## VENDOR SUMMARY :- PHP Scripts Mall Pvt. Ltd. is a professional software selling portal offering wide range of innovative. PHP Scripts Mall is a leading business and technology firm with 12 years of successful track record in completion and implementation of numerous projects in various
verticals and domains.. It has 300 plus PHP scripts ready to buy.

## Vulnerability Description => A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files.
************************************************
————————-
Proof of Concept:-
————————–
1. Go to the site (https://www.phpscriptsmall.com/product/professional-b2b-script/ ) ,Select User Demo.
2- Click on Join Free => Fill the Form and Create an Account using your name email and soo on …
3- Goto your mail and Verify it.
4-When you logged in , Spider the host through Burpsuit.
5-Now search the URL having any images . Ex-http://readymadeb2bscript.com/basic-b2b/uploads/200px-Amanita_muscaria_(fly_agaric).JPG
6-Now Erase the url from last and you will find all the Directory . Ex- http://readymadeb2bscript.com/basic-b2b/uploads/

Also can test it from Intruder

Admin
Welcome Sir, .. Myself Vikas Chaudhary , i was interested in general knowledge since childhood , so i thought why not to share my knowledge with you, that's why i created this educational blog. Here you find world wide general knowledge of all Latest technology , Science & History Que , and Mysterious fact of the world. Here you also find knowledge about cyber security. Thanks for visit.. keep supporting....keep Loving
https://www.gkaim.com

Leave a Reply

%d bloggers like this: