Submit #93161: The file_path parameter of the index.php file of muyucms has an arbitrary file reading vulnerabilityinfo

TitelThe file_path parameter of the index.php file of muyucms has an arbitrary file reading vulnerability
BeschreibungAn arbitrary file reading vulnerability has been discovered in the muyucms system, through which an attacker can obtain the information of arbitrary files on the computer and thus gain control of the computer. In this way,we can make a txt file,and we can capture the package and modify the paragrame to test.txt,after sending the package,we will read the content of the txt file.
Quelle⚠️ https://github.com/MuYuCMS/MuYuCMS/issues/3
Benutzer
 kaga_cve (UID 41588)
Einreichung22.02.2023 16:03 (vor 3 Jahren)
Moderieren24.02.2023 08:42 (2 days later)
StatusAkzeptiert
VulDB Eintrag221735 [MuYuCMS 2.2 index.php file_path Directory Traversal]
Punkte19

Want to know what is going to be exploited?

We predict KEV entries!