# N/A
## 概述
mojoPortal 版本 2.9.0.1 及以下存在目录遍历漏洞,通过 BetterImageGallery API Controller 的 ImageHandler 动作可以被利用。
## 影响版本
- <=2.9.0.1
## 细节
攻击者利用此漏洞可以访问 Web.Config 文件,并获取 MachineKey。
## 影响
攻击者能够读取敏感配置信息,如 MachineKey,可能导致进一步的安全风险。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | mojoPortal <=2.9.0.1 is vulnerable to Directory Traversal via BetterImageGallery API Controller - ImageHandler Action. An attacker can exploit this vulnerability to access the Web.Config file and obtain the MachineKey. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-28367.yaml | POC详情 |
标题: GitHub - i7MEDIA/mojoportal: mojoPortal is an extensible, cross database, mobile friendly, web content management system (CMS) and web application framework written in C# ASP.NET. -- 🔗来源链接
标签:
标题: Advisory: mojoPortal CMS - Unauthenticated Remote Code Execution via Directory Traversal & ViewState Deserialization (CVE-2025-28367) -- 🔗来源链接
标签: