Description
YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Numan Türle
References
www.exploit-db.com/exploits/49534
www.exploit-db.com/exploits/49534 (ExploitDB-49534)
mfscripts.com (Vendor Homepage)
yetishare.com (Software Product Page)
www.vulncheck.com/...t-remote-file-upload-ssrf-vulnerability (VulnCheck Advisory: YetiShare File Hosting Script 5.1.0 Remote File Upload SSRF Vulnerability)