### [CVE-2018-11413](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11413) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An issue was discovered in BearAdmin 0.5. Remote attackers can download arbitrary files via /admin/databack/download.html?name= directory traversal sequences, as demonstrated by name=../application/database.php to read the MySQL credentials in the configuration. ### POC #### Reference - https://github.com/yupoxiong/BearAdmin/issues/5 - https://github.com/yupoxiong/BearAdmin/issues/5 #### Github No PoCs found on GitHub currently.