This exploit demonstrates an arbitrary file download vulnerability in JCMS 2010 due to lack of input validation in the downfile.jsp module. Attackers can download any file by manipulating the filename and pathfile parameters.
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:JCMS 2010
No auth needed
Prerequisites:Access to the target server's downfile.jsp endpoint