Title | DESHANG DSKMS <=3.1.2 Pre-authentication arbitrary file download |
---|
Description | The DSKMS system version 3.1.2 and earlier versions have a pre-authentication arbitrary file download vulnerability in the public/install.php file. This vulnerability allows an attacker to bypass the installed check by setting a cookie with action=finish and manipulating the step parameter to connect to any MySQL server. In PHP versions 7.1 or earlier, this could be exploited to load files from the client using a rogue MySQL server. Once connected, an attacker can send a request to trigger the vulnerability, potentially leading to unauthorized data access. |
---|
Source | ⚠️ https://note.zhaoj.in/share/MarH4fY66BgO |
---|
User | glzjin (ID 59815) |
---|
Submission | 01/08/2024 18:29 (4 months ago) |
---|
Moderation | 01/11/2024 11:23 (3 days later) |
---|
Status | Accepted |
---|
VulDB Entry | 250433 |
---|