The exploit demonstrates a local file disclosure vulnerability in A2CMS due to insufficient input validation. By manipulating the 'f' parameter in the URL, an attacker can traverse directories and read arbitrary local files, such as '/etc/passwd'.
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:A2CMS
No auth needed
Prerequisites:Access to the vulnerable A2CMS application