This exploit demonstrates an arbitrary file download vulnerability in doorGets CMS 7.0 by manipulating the 'f' parameter in the download.php script to traverse directories and access sensitive files like win.ini.
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:doorGets CMS 7.0
No auth needed
Prerequisites:Access to the target web application