Lucene search

K
huntrTakester7CA13522-D0C9-4EFF-A7DD-6FD1A7F205A2
HistoryOct 28, 2021 - 5:06 p.m.

Path Traversal in getgrav/grav

2021-10-2817:06:03
takester
www.huntr.dev
21
path traversal
local host
file access
sensitive data disclosure
bug bounty

EPSS

0.002

Percentile

55.6%

Steps:

Host the project locally.

For example if address is http://127.0.0.1:8088 ==> visit http://127.0.0.1:8088/system/config/permissions.yaml

http://127.0.0.1:8088/system/config/permissions.yaml ==> you will get the content of permissions.yaml file.

Impact:

Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of restricted directory on the remote server. This could lead to the disclosure of sensitive data on the vulnerable server.

EPSS

0.002

Percentile

55.6%

Related for 7CA13522-D0C9-4EFF-A7DD-6FD1A7F205A2