Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

/module/admin_conf/download.php $_GET["file"] variable exists arbitrary file download vulnerability #8

Closed
hi-KK opened this issue Aug 30, 2017 · 1 comment

Comments

@hi-KK
Copy link

hi-KK commented Aug 30, 2017

Hello, I found that there are some problems with eonweb, hoping to help you and your work
/module/admin_conf/download.php

if(isset($_GET["file"])){
	$dwn="/tmp/".$_GET["file"];
	header("Content-type: application/octet-stream");
	header("Content-Disposition: attachment; filename=".$_GET["file"]);
	flush(); 
	readfile($dwn);
}

'$_GET["file"]' is not filtered,and exists arbitrary file download vulnerability
So when we open this url:
https://localhost/module/admin_conf/download.php?file=../../etc/passwd
it would download the file '/etc/passwd'
1
and we can get the contents of this file
2

@jeanphilippelevy
Copy link
Contributor

Fix here :
3163221240db69d417cf6bb8456f87653d472f21

Thank you for the advice !

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants