zrlog
zrlog copied to clipboard
Arbitrary file download vulnerability via database backup plugin 1.6.0
The current version of the database backup plugin (1.6.0) is vulnerable to arbitrary file download,the file parameter value is not filtered
1、Plugin download link:http://dl.zrlog.com/plugin/backup-sql-file.jar
2、Vulnerability file: BackupController.java
POC
http://118.24.153.47/admin/plugins/backup-sql-file/downfile?file=../../../../../../../../etc/passwd


@rank0 Thanks, This demo site run docker container, So /etc/passwd not host password, Will fix in next version