Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

EloanV3.0 P2P directory traversal vulnerabilities #1

Attrck opened this Issue Mar 2, 2019 · 0 comments


None yet
1 participant
Copy link

Attrck commented Mar 2, 2019

Holes for details:
EloanV3.0 P2P directory traversal vulnerabilities,
Directory traversal (arbitrary files download) hole is different from the site directory browsing, the vulnerability is not only can traverse the web under the system files, and you can browse or download the files in the system, the attack people through directory traversal attacks can access to system files and server configuration files, and so on. In general, they use the server API, standard file permissions. Strictly speaking, directory traversal attack is not a web vulnerability, but web designers design "holes". If a web designer to design the web content, does not have the proper access control allows HTTP traversal, the attacker can access restricted directories, and can execute commands outside the web root directory.

Vulnerability screenshots:


Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.