Loading HuntDB...

[https://███] Local File Inclusion via graph.php

Medium
U
U.S. Dept Of Defense
Submitted None
Reported by cablej_dds

Vulnerability Details

Technical details and impact analysis

Path Traversal
**Summary:** There exists a Local File Inclusion vulnerability on https://████ due to a known vulnerability in the ZendTo library. This was fixed in [Version 5.16-6 Beta](https://zend.to/changelog.php), although ██████ is still running ZendTo 5.11. ## Impact This allows path traversal in a file name that is then returned to the user. Depending on the PHP version ████ is running, this may allow escaping the appended suffix and reading arbitrary local files, which would allow complete compromise of the ██████ system. ## Step-by-step Reproduction Instructions To reproduce, this requires being an ████████ account. This could be exploited by sending a malicious link to an ████████ of ████████. 1. If you have access to an █████ account on █████████, visit `https://█████/graph.php?p=7&m=../../../../../../usr/share/apache2/icons/pie` as a POC. This loads an image of a pie, demonstrating the path traversal vulnerability. 2. Without access to an ████ account, visit my server at https://████/ and log in with username `████████` and password `██████`. 3. Visit https://████/graph.php?m=dropoff_count&p=7&m=../../../../../../usr/share/apache2/icons/pie. Observe the tiny image of a pie, demonstrating path traversal. ## Vulnerable Code The following block of code (in `graph.php`) reads a file from the `m` parameter unfiltered: ``` if ( $period && ($metric = $_GET['m']) || ($metric = $_POST['metric']) ) { if ( is_readable($path = RRD_DATA_DIR.$metric.$period.'.png') ) { readfile($path); exit(0); } } ``` ## Product, Version, and Configuration (If applicable) ZendTo < 5.16-6 Beta ## Suggested Mitigation/Remediation Actions Update the ZendTo software. ## Impact .

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Path Traversal