Submit #93161: The file_path parameter of the index.php file of muyucms has an arbitrary file reading vulnerabilityinfo

TitleThe file_path parameter of the index.php file of muyucms has an arbitrary file reading vulnerability
DescriptionAn arbitrary file reading vulnerability has been discovered in the muyucms system, through which an attacker can obtain the information of arbitrary files on the computer and thus gain control of the computer. In this way,we can make a txt file,and we can capture the package and modify the paragrame to test.txt,after sending the package,we will read the content of the txt file.
Source⚠️ https://github.com/MuYuCMS/MuYuCMS/issues/3
User
 kaga_cve (UID 41588)
Submission02/22/2023 16:03 (3 years ago)
Moderation02/24/2023 08:42 (2 days later)
StatusAccepted
VulDB entry221735 [MuYuCMS 2.2 index.php file_path path traversal]
Points19

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!