| Title | The file_path parameter of the index.php file of muyucms has an arbitrary file reading vulnerability |
|---|
| Description | An arbitrary file reading vulnerability has been discovered in the muyucms system, through which an attacker can obtain the information of arbitrary files on the computer and thus gain control of the computer.
In this way,we can make a txt file,and we can capture the package and modify the paragrame to test.txt,after sending the package,we will read the content of the txt file. |
|---|
| Source | ⚠️ https://github.com/MuYuCMS/MuYuCMS/issues/3 |
|---|
| User | kaga_cve (UID 41588) |
|---|
| Submission | 02/22/2023 16:03 (3 years ago) |
|---|
| Moderation | 02/24/2023 08:42 (2 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 221735 [MuYuCMS 2.2 index.php file_path path traversal] |
|---|
| Points | 19 |
|---|