YzmCMS_3.6_Bug

YzmCMS 3.6 bug

[Suggested description] YzmCMS 3.6 allows remote attackers to discover the full path via a direct request to application/install/templates/s1.php.

[Additional Information] The vulnerability was discovered by downloading the program's source code to local and online deployment tests.

Location: domain/application/install/templates/s1.php

Code: <?php require './templates/header.php'; ?>

Rows : 10

Return error : Warning: require(./templates/header.php): failed to open stream: No such file or directory in /www/application/install/templates/s1.php on line 10 Fatal error: require(): Failed opening required './templates/header.php' (include_path='.;C:\php\pear') in /www/application/install/templates/s1.php on line 10

Harm: Web Site physical path leakage .

Conditions for Execution: Normal access can

Edition: YzmCMS 3.6

Cause the cause : require(): Failed opening required './templates/header.php' (include_path='.;C:\php\pear') in /www/application/install/templates/s1.php on line 10, cause path leakage.

POC : http://127.0.0.1/application/install/templates/s1.php

fix suggestions : Modify the application source code to avoid information leakage.

[VulnerabilityType Other] physical path leakage

[Vendor of Product] YzmCMS

[Affected Product Code Base] YzmCMS - 3.6

[Affected Component] /application/install/templates/s1.php , require(./templates/header.php): failed to open stream: No such file or directory , Web Site physical path leakage .

[Attack Type] Remote

[Impact Information Disclosure] true

[Attack Vectors] The vulnerability is triggered by accessing the following URL : http://domain/application/install/templates/s1.php

[Discoverer] kongxin

Last updated