Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Example Analysis of arbitrary File Reading vulnerability in MetInfo

2025-01-23 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

This article mainly shows you the "example analysis of MetInfo arbitrary file reading vulnerabilities", which is easy to understand and well-organized. I hope it can help you solve your doubts. Let the editor lead you to study and study the "sample analysis of MetInfo arbitrary file reading vulnerabilities".

* the relevant vulnerabilities involved in this article have been reported to the manufacturer and repaired. This article is limited to technical research and discussion, and illegal use is strictly prohibited, otherwise all consequences will be borne by ourselves.

WAM (Web application monitoring program, WAM at the end of the article) monitors the update of the MetInfo version and automatically diff the files. From the point of view of diff, it should fix an arbitrary file reading vulnerability, but it is not completely repaired, so it can still be bypassed. This article is to record the process of repairing and bypassing this vulnerability.

Brief introduction of vulnerabilities

MetInfo is a content management system developed using PHP and Mysql. An arbitrary file read vulnerability exists in the old_thumb.class.php file in MetInfo version 6.0.0 and 6.1.0. An attacker can exploit the vulnerability to read sensitive files on the website.

Vulnerability impact

MetInfo 6.0.0

MetInfo 6.1.0

Loophole analysis

See\ MetInfo6\ app\ system\ include\ module\ old_thumb.class.php

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report