Description
Surreal ToDo 0.6.1.2 contains a local file inclusion vulnerability that allows unauthenticated attackers to read arbitrary files by manipulating the content parameter. Attackers can supply directory traversal sequences through the content parameter in index.php to access sensitive system files like configuration and initialization files.
Problem types
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
Credits
Ihsan Sencan
References
www.exploit-db.com/exploits/45826 (ExploitDB-45826)
www.vulncheck.com/...-todo-local-file-inclusion-via-indexphp (VulnCheck Advisory: Surreal ToDo 0.6.1.2 Local File Inclusion via index.php)