module

S40 0.4.2 CMS Directory Traversal Vulnerability

Disclosed
2011-04-07
Created
2018-05-30

Description

This module exploits a directory traversal vulnerability found in S40 CMS.
The flaw is due to the 'page' function not properly handling the $pid parameter,
which allows a malicious user to load an arbitrary file path.

Authors

Osirys osirys@autistici.org
sinn3r sinn3r@metasploit.com

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/scanner/http/s40_traversal
msf auxiliary(s40_traversal) > show actions
...actions...
msf auxiliary(s40_traversal) > set ACTION < action-name >
msf auxiliary(s40_traversal) > show options
...show and set options...
msf auxiliary(s40_traversal) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.