header-logo
Suggest Exploit
vendor:
Sitemagic CMS
by:
Unknown
6.5
CVSS
MEDIUM
Directory Traversal
22
CWE
Product Name: Sitemagic CMS
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: CVE-2011-1007
CPE: a:sitemagic:sitemagic_cms
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Sitemagic CMS Directory Traversal Vulnerability

The Sitemagic CMS is prone to a directory-traversal vulnerability that allows an attacker to obtain arbitrary local files by supplying a specially crafted input in the 'SMTpl' parameter of the 'index.php' script. By including '../' sequences in the parameter value, an attacker can traverse the directory structure and access files outside the intended directory.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize and validate user-supplied input before using it in file operations. Additionally, restricting access to sensitive files and directories can also help prevent unauthorized access.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/48399/info

Sitemagic CMS is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to obtain arbitrary local files in the context of the webserver process. 

http://www.example.com/smcmsdemoint/index.php?SMTpl=../../../../../../../../../../etc/passwd%00.png