| 제목 | The file_path parameter of the index.php file of muyucms has an arbitrary file reading vulnerability |
|---|
| 설명 | An arbitrary file reading vulnerability has been discovered in the muyucms system, through which an attacker can obtain the information of arbitrary files on the computer and thus gain control of the computer.
In this way,we can make a txt file,and we can capture the package and modify the paragrame to test.txt,after sending the package,we will read the content of the txt file. |
|---|
| 원천 | ⚠️ https://github.com/MuYuCMS/MuYuCMS/issues/3 |
|---|
| 사용자 | kaga_cve (UID 41588) |
|---|
| 제출 | 2023. 02. 22. PM 04:03 (3 연령 ago) |
|---|
| 모더레이션 | 2023. 02. 24. AM 08:42 (2 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 221735 [MuYuCMS 2.2 index.php file_path 디렉토리 순회] |
|---|
| 포인트들 | 19 |
|---|