PhpMyExplorer is a PHP application that allows a user to update a website online without any FTP access easily. Many servers have a vulnerability through which, the host application will allow an attacker to view and read files that reside outside the regular bound directory. An attacker who takes note of the presence of the phpMyExlorer on the web application can modify the contents or even erase the site entirely. This vulnerability can be exploited through directory traversal attack. Directory traversal attack is an attack through which an attacker can access and modify files outside of webroot folder in the host server using HTTP. The best method to fix this vulnerability is to implement the files access limitation of the Web server.
The following URL is an example of this vulnerability:
https://www.example.beaglesecurity.com/index.php?chemin=..%2F..%2F..%2F..%2F..%2F..%2Fetc
Under this vulnerability, any user can browse the /etc/ directory and view any files in the web server with read access. The %2F is the URL Encoded value of the Forward Slash (/).
The attacker can easily exploit this vulnerability to gain unauthorised access to the application or access the underlying database. The attacker can also gain access to all the files and folders outside of Webroot and access restricted and sensitive information to comprise the application. He can also impersonate a user to steal information from the application. This type of attack will not leave any trails behind. Thus, detecting this vulnerability is hard.
Beagle recommends the following fixes:-