[<prev] [next>] [day] [month] [year] [list]
Message-ID: <PS1PR04MB1001D351675C29EF096C50F0DF0E0@PS1PR04MB1001.apcprd04.prod.outlook.com>
Date: Sun, 9 Apr 2017 13:23:09 +0000
From: Wester 95 <evilzyzeng@...look.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] CVE Request:Directory Traversal in smilie module(MyBB <1.8.11)
Hi team,
I would like to request one CVE for this vulnerability, thank you!
#################################
Description:
============
product:MyBB
Homepage:https://mybb.com/
vulnerable version:<1.8.11
Severity:Low risk
===============
Proof of Concept:
=============
vulnerability address:http://127.0.0.1/mybb_1810/Upload/admin/index.php?module=config-smilies&action=add_multiple
vulnerability file directory:/webroot/mybb_1810/Upload/admin/modules/config/smilies.php
vulnerability Code:
Line 326 $path = $mybb->input['pathfolder'];
Line 327 $dir = @opendir(MYBB_ROOT.$path);
if we input "pathfolder" to "../../bypass/smile",Directory Traversal success!
============
Fixed:
============
This vulnerability was fixed in version 1.8.11
https://blog.mybb.com/2017/04/04/mybb-1-8-11-merge-system-1-8-11-release/
=============
Best regards,
Zhiyang Zeng of Tencent security platform department
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists