POC详情: ca6930ff6b33016b78765d9cea1c38dc924a6ec6

来源
关联漏洞
标题: TinyFileManager 路径遍历漏洞 (CVE-2021-40964)
描述:TinyFileManager是一个基于 Web 的文件管理器。用于通过 Web 浏览器在线存储、上传、编辑和管理文件和文件夹。 TinyFileManager 2.4.6及以下所有版本存在路径遍历漏洞,该漏洞源于软件对于fullpath参数缺乏有效的验证与转义,攻击者可利用该漏洞上传文件以浏览服务器的预期工作目录,并写入恶意文件到计算机上的任何目录。
描述
Tiny File Manager <= 2.4.6 - Remote Code Execution (RCE)
介绍
# Tiny File Manager <= 2.4.6 - Remote Code Execution (Authenticated)

![Exploit Status](https://img.shields.io/badge/status-working-brightgreen)
![Language](https://img.shields.io/badge/bash-script-blue)
![CVE](https://img.shields.io/badge/CVE-2021--40964-red)

## 🚨 About the Exploit

This is a Bash-based authenticated **Remote Code Execution (RCE)** exploit for **Tiny File Manager versions <= 2.4.6**, vulnerable under **CVE-2021-40964**.

The script leverages:
- Weak upload validation and webroot disclosure,
- An arbitrary file upload vulnerability, leading to PHP code execution.

---

## 📌 Details

- **Exploit Title:** Tiny File Manager <= 2.4.6 - Remote Code Execution (RCE)
- **CVE:** [CVE-2021-40964](https://nvd.nist.gov/vuln/detail/CVE-2021-40964)
- **Author:** `Z3R0 (0x30)`
- **Vulnerable Version:** ≤ 2.4.6
- **Authentication Required:** Yes (Admin credentials)

---

## ⚙️ Prerequisites

Ensure the following tools are installed:

```bash
sudo apt install curl jq
文件快照

[4.0K] /data/pocs/ca6930ff6b33016b78765d9cea1c38dc924a6ec6 ├── [2.5K] CVE-2021-40964_ZERO.sh └── [ 995] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。