mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 19:17:37 +02:00
26 lines
1.1 KiB
Markdown
26 lines
1.1 KiB
Markdown
### [CVE-2017-7282](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7282)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
An issue was discovered in Unitrends Enterprise Backup before 9.1.1. The function downloadFile in api/includes/restore.php blindly accepts any filename passed to /api/restore/download as valid. This allows an authenticated attacker to read any file in the filesystem that the web server has access to, aka Local File Inclusion (LFI).
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/H4cksploit/CVEs-master
|
|
- https://github.com/RhinoSecurityLabs/CVEs
|
|
- https://github.com/lnick2023/nicenice
|
|
- https://github.com/merlinepedra/RHINOECURITY-CVEs
|
|
- https://github.com/merlinepedra25/RHINOSECURITY-CVEs
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
- https://github.com/sunzu94/AWS-CVEs
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
|