Home > CVE > PHP Scripts Mall Opensource Classified Ads Script 3.2.2 has directory traversal-CVE-2019-7436

PHP Scripts Mall Opensource Classified Ads Script 3.2.2 has directory traversal-CVE-2019-7436

cve-2019-7436-vikas-chaudhary


*******************************************************************************************
# Exploit Title: PHP Scripts Mall Opensource Classified Ads Script 3.2.2 has directory traversal via a direct request for a listing of an uploads directory
# Date: 30.12.2018
# Site Title : Opensource Classified Ads Script
# Vendor Homepage: https://www.phpscriptsmall.com/
#Vendor Software: https://www.phpscriptsmall.com/product/professional-classified-ads-script/
# Software Link: 198.38.86.159/~classic/
# Category: Web Application
# Version: 3.2.2
# Exploit Author: Vikas Chaudhary
# Contact: https://www.facebook.com/profile.php?id=100011287630308
# Web: https://gkaim.com/
# Tested on: Windows 10 -Firefox
# CVE-2019-7436
*****************************************************************************************
Vulnerability Description => A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files.
****************************************************************************************

Proof of Concept:-
————————–
1. Go to the site (198.38.86.159/~classic/ ) .
2- Click on Register => and then fill the forms.
3-Goto your mail and Verify it.
4-Come back to site and Login using your Verified Mail and Password.
5-Open Burpsuit and intercept the data.
6-Now Pick any url contains wp-content ex (http://198.38.86.159/~classic/admin/uploads/classi.jpg )
7- Now show response in browser and delete the last portion of url (after last / ) Ex- http://198.38.86.159/~classic/admin/uploads/
8- You will get all The file lists
** Also can check it by intruder .**
***************************************************************************************

Admin
Welcome Sir, .. Myself Vikas Chaudhary , i was interested in general knowledge since childhood , so i thought why not to share my knowledge with you, that's why i created this educational blog. Here you find world wide general knowledge of all Latest technology , Science & History Que , and Mysterious fact of the world. Here you also find knowledge about cyber security. Thanks for visit.. keep supporting....keep Loving
https://www.gkaim.com

Leave a Reply

%d bloggers like this: