This exploit demonstrates a directory traversal vulnerability in CMS ISWEB 3.5.3, allowing unauthorized access to sensitive files like config.php via a crafted URL. The PoC includes a sample request and leaked database credentials.
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:CMS ISWEB 3.5.3
No auth needed
Prerequisites:Network access to the target web application