Path Traversal in admin/download.php in Chadha PHPKB Standard Multi-Language 9 allows remote attackers to download files from the server using a dot-dot-slash sequence (../) via the GET parameter file.
                
            References
                    | Link | Resource | 
|---|---|
| http://antoniocannito.it/?p=137#afd | Exploit Third Party Advisory | 
| http://packetstormsecurity.com/files/156754/PHPKB-Multi-Language-9-Authenticated-Directory-Traversal.html | Third Party Advisory VDB Entry | 
| https://antoniocannito.it/phpkb1#authenticated-arbitrary-file-download-cve-2020-10387 | Exploit Third Party Advisory | 
| https://www.exploit-db.com/exploits/48220 | Third Party Advisory VDB Entry | 
Configurations
                    Information
                Published : 2020-03-12 07:15
Updated : 2022-08-19 14:46
NVD link : CVE-2020-10387
Mitre link : CVE-2020-10387
JSON object : View
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
                chadhaajay
- phpkb
 


