Submit #264117: DESHANG DSKMS <=3.1.2 Pre-authentication arbitrary file downloadinfo

TitleDESHANG DSKMS <=3.1.2 Pre-authentication arbitrary file download
DescriptionThe DSKMS system version 3.1.2 and earlier versions have a pre-authentication arbitrary file download vulnerability in the public/install.php file. This vulnerability allows an attacker to bypass the installed check by setting a cookie with action=finish and manipulating the step parameter to connect to any MySQL server. In PHP versions 7.1 or earlier, this could be exploited to load files from the client using a rogue MySQL server. Once connected, an attacker can send a request to trigger the vulnerability, potentially leading to unauthorized data access.
Source⚠️ https://note.zhaoj.in/share/MarH4fY66BgO
Userglzjin (ID 59815)
Submission01/08/2024 18:29 (4 months ago)
Moderation01/11/2024 11:23 (3 days later)
StatusAccepted
VulDB Entry250433

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!