Path Traversal via Files Manager in microweber/microweber
Reported on
Jun 1st 2022
Description
Please enter a description of the vulnerability.
Steps to reproduce
1.Login to admin panel and go to Modules -> Files
(http://localhost/microweber/admin/view:modules/load_module:files
)
2.Click any file, the url will have the following format: http://localhost/microweber/admin/view:modules/load_module:files#select-file=http://localhost/microweber/userfiles/media/default/defaultprofile_445.jpg
3.Change the url to http://localhost/microweber/admin/view:modules/load_module:files#select-file=http://localhost/test.txt
(test.txt is the file outside of microwbever's directory)
4.The content of test.txt (is outside of microwbever's directory) will be appear in dialog
Image POC
https://drive.google.com/file/d/1WrLaAOo8NHF-ik7I4xy-oq7Mr6osWpYn/view?usp=sharing
Impact
Attacker can read files outside the microweber folder
We do not auto-assign CVEs to reports that have been given a low severity rating.