Description
Directory traversal vulnerability in upload/bin/download.php in Upload Tool for PHP 1.0 allows remote attackers to read arbitrary files via (1) ".." sequences or (2) absolute pathnames in the filename parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Craig Heffner · textwebappsphp
https://www.exploit-db.com/exploits/29072
References (5)
Core 5
Core References
Exploit, URL Repurposed x_refsource_misc
http://www.craigheffner.com/security/exploits/upload_tool_php.txt
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/22973
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/30322
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/21150
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/4575
Scores
EPSS
0.0388
EPSS Percentile
88.3%
Details
Status
published
Products (1)
php_upload_tool/php_upload_tool
1.0
Published
Mar 06, 2007
Tracked Since
Feb 18, 2026