vendor:
GDidees CMS
by:
Hadi Mene
7.5
CVSS
HIGH
Local File Disclosure
434
CWE
Product Name: GDidees CMS
Affected Version From: 3.9.2001
Affected Version To: 3.9.2001
Patch Exists: NO
Related CWE: CVE-2023-27179
CPE: a:gdidees:gdidees_cms
Tags: packetstorm,cve,cve2023,file-download,gdidees,lfr
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Nuclei References:
https://www.gdidees.eu/cms-1-0.html, https://gist.github.com/Hadi999/516aa25b953b0cba57089a0c11b1305b, https://nvd.nist.gov/vuln/detail/CVE-2023-27179, http://packetstormsecurity.com/files/171894/GDidees-CMS-3.9.1-Local-File-Disclosure-Directory-Traversal.html, https://knowledge-base.secureflag.com/vulnerabilities/unrestricted_file_download/unrestricted_file_download_vulnerability.html
Nuclei Metadata: {'max-request': 1, 'verified': True, 'vendor': 'gdidees', 'product': 'gdidees_cms'}
Platforms Tested: Debian 11
2023
GDidees CMS 3.9.1 – Local File Disclosure
GDidees CMS v3.9.1 and lower versions was discovered to contain a local file disclosure vulnerability via the filename parameter at /_admin/imgdownload.php. Imgdownload.php is mainly used by the QR code generation module to download an QR code. The vulnerability occurs in line 4 where the filename parameter which will be opened later is not filtered or sanitized. Furthermore, there is no admin session check in this code as it should since only the admin user should normally be able to download QR code.
Mitigation:
Ensure that the filename parameter is properly sanitized and validated before being used. Also, ensure that only the admin user is allowed to download the QR code.