Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-39433 PoC — Biqs It Biqs-drive 安全漏洞

Source
Associated Vulnerability
Title:Biqs It Biqs-drive 安全漏洞 (CVE-2021-39433)
Description:Biqs It Biqs-drive是比利时Biqs It公司的一个在线驾驶学校软件。 BIQS IT Biqs-drive v1.83 及以下版本存在安全漏洞,该漏洞允许攻击者使用配置的网络用户的权限从服务器读取任意文件。
Description
Kerentanan ini merupakan jenis Local File Inclusion (LFI) yang terdapat pada versi BIQS IT Biqs-drive v1.83 dan di bawahnya. Kerentanan ini dapat dieksploitasi dengan mengirimkan payload tertentu sebagai parameter file ke download/index.php
Readme
CVE-2021-39433: Local File Inclusion (LFI) Vulnerability in BIQS IT Biqs-drive

This vulnerability is a type of Local File Inclusion (LFI) that affects versions of BIQS IT Biqs-drive v1.83 and below. It can be exploited by sending a specific payload as a file parameter to download/index.php, allowing an attacker to read arbitrary files from the server with the permissions of the configured web-user.

Exploitation of CVE-2021-39433 by Buble x KristianMD

Reference: https://cve.circl.lu/cve/CVE-2021-39433

Screnshoot :

<img width="960" alt="{8A67A3D8-DEFF-49E0-9FA1-B5B59BB14147}" src="https://github.com/user-attachments/assets/55570e66-0da2-45aa-9633-e71221cf29ad">
File Snapshot

[4.0K] /data/pocs/d8a094b1fd55ffe8fa327a920120075fe92d27a3 ├── [4.2K] read_lfi_input.py ├── [9.2K] read_lfi.py └── [ 673] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.