This exploit demonstrates a directory traversal vulnerability in Plogger's phpThumb.php, allowing unauthorized file disclosure via manipulated 'src', 'w', and 'h' parameters. The PoC shows how to read arbitrary files like /etc/passwd using null byte injection.
Classification
Working Poc 90%
Attack Type
Info Leak
Complexity
Trivial
Reliability
Reliable
Target:Plogger (version not specified)
No auth needed
Prerequisites:Access to the vulnerable phpThumb.php endpoint