Skip to content

Directory Traversal vulnerability #843

@blorange2

Description

@blorange2

On one of my servers, if you were to go to:

mydomain.com/laravel-filemanager/download?working_dir=&type=Files&file=../../../../../../../../../../../../../../../homepages/45/d641872465/htdocs/.bash_history

It'll actually download the file, this is problematic because you can essentially break out of the application and affect the actual server.

I need to look into how I could secure this but I thought I'd bring it to your attention.

Metadata

Metadata

Assignees

No one assigned

    Labels

    securityExploits, attacks, dangerous leaks.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions