BUG_Author: xuanSAMA

Affected Version: MoneyPrinterTurbo ≤ 1.2.6

Vendor: MoneyPrinterTurbo GitHub Repository

Software: MoneyPrinterTurbo

Vulnerability Files:

Description:

  1. Path Traversal Vulnerability:

  2. Exploiting the Vulnerability:

  3. Example Path Traversal Payload:

  4. Requesting the Vulnerable Endpoints:

  5. Verifying the Exploit:

Proof of Concept:

  1. Ensure the vulnerable version of the MoneyPrinterTurbo application is running.

  2. Open a web browser or use a command-line tool like curl to make requests to the vulnerable endpoints.

  3. Use the following URLs, replacing <target-ip>:<port> with the actual address of the application:

  4. If the vulnerability is present, the application will serve or stream the /etc/passwd file, confirming the path traversal flaw.