Plattform
php
Komponente
pmb
Behoben in
5.6.1
CVE-2020-36970 describes a local file disclosure vulnerability discovered in PMB version 5.6. This flaw allows attackers to read arbitrary files on the system by manipulating the 'chemin' parameter within the getgif.php script. Successful exploitation could expose sensitive information, potentially leading to system compromise. Affected users should upgrade to a patched version of PMB as soon as possible.
The vulnerability lies in the getgif.php script's handling of the 'chemin' parameter. Due to a lack of proper sanitization, an attacker can craft a malicious request that includes a file path, allowing them to read files outside the intended scope. For example, an attacker could request /getgif.php?chemin=/etc/passwd to retrieve the contents of the system's password file. This could expose usernames, potentially enabling brute-force attacks or privilege escalation. The impact is significant as it allows for the exposure of sensitive system files, potentially compromising the entire server. While the vulnerability requires local access to the PMB application, it represents a serious risk for environments where such access is readily available.
The vulnerability was publicly disclosed on 2026-01-28. There is no indication of this CVE being added to the CISA KEV catalog or any active exploitation campaigns. Public proof-of-concept exploits are not widely known, but the vulnerability's nature makes it relatively straightforward to exploit, increasing the likelihood of future exploitation if left unpatched. The lack of a fixed version in the provided data makes timely remediation challenging.
Organizations using PMB 5.6, particularly those hosting the application on shared hosting environments or with limited security controls, are at significant risk. Systems with misconfigured file permissions or where the web server process has elevated privileges are also more vulnerable.
• php / web:
grep -r 'chemin=' /var/www/html/getgif.php• php / web: Check web server access logs for requests to getgif.php with unusual or suspicious values in the chemin parameter.
• generic web: Use curl to test the getgif.php endpoint with various file paths to see if sensitive files can be accessed.
curl 'http://your-pmb-server/getgif.php?chemin=/etc/passwd'disclosure
Exploit-Status
EPSS
0.01% (1% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2020-36970 is to upgrade to a patched version of PMB. Unfortunately, the input does not specify a fixed version. Until a patch is available, consider implementing temporary workarounds. Restrict access to the getgif.php script using a web application firewall (WAF) or proxy server, blocking requests with suspicious parameters in the 'chemin' field. Implement strict input validation on the 'chemin' parameter, ensuring it only accepts expected file paths and preventing directory traversal attempts. Regularly review PMB's configuration and access controls to minimize potential attack surfaces. After upgrading, confirm the vulnerability is resolved by attempting to access a sensitive file via the getgif.php script and verifying that access is denied.
Actualizar a una versión parcheada o aplicar las medidas de seguridad necesarias para evitar la divulgación de archivos locales. Validar y sanitizar correctamente la entrada del parámetro 'chemin' para evitar el acceso a archivos no autorizados.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2020-36970 is a vulnerability in PMB 5.6 that allows attackers to read arbitrary system files by manipulating the 'chemin' parameter in getgif.php.
If you are running PMB version 5.6, you are potentially affected by this vulnerability. Upgrade to a patched version as soon as possible.
The recommended fix is to upgrade to a patched version of PMB. If upgrading is not immediately possible, implement temporary workarounds like restricting access to getgif.php or validating the 'chemin' parameter.
There is currently no evidence of CVE-2020-36970 being actively exploited in the wild, but the vulnerability's simplicity suggests it could be exploited if discovered.
Refer to the PMB project's official website or security advisories for the latest information and updates regarding CVE-2020-36970.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.