# N/A
## 漏洞概述
OS4ED的openSIS Classic社区版本9.0中存在一个目录遍历漏洞,攻击者可以通过操纵`DownloadWindow.php`文件中的`filename`参数来读取任意文件。
## 影响版本
- OS4ED's openSIS Classic Community Edition 9.0
## 漏洞细节
在`DownloadWindow.php`文件中,`filename`参数未经过适当验证,攻击者可以通过构造特定的输入,利用目录遍历漏洞来访问服务器上的任意文件。
## 漏洞影响
攻击者可以远程读取服务器上的任意文件,导致敏感信息泄露。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | A path traversal vulnerability exists in openSIS Classic Community Edition v9.0 via the 'filename' parameter in DownloadWindow.php. An unauthenticated remote attacker can exploit this to read arbitrary files on the server by manipulating file paths. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-38879.yaml | POC详情 |
标题: GitHub - OS4ED/openSIS-Classic: openSIS is a commercial grade, secure, scalable & intuitive Student Information System, School Management Software from OS4ED. Has all functionalities to run single or multiple institutions in one installation. Web based, php code, MySQL database. -- 🔗来源链接
标签:
神龙速读从