Destiney Links Script v2.1.2

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1053229 漏洞类型
发布时间 2006-05-24 更新时间 2006-05-24
CVE编号 CVE-2006-2536
CVE-2006-2535
CVE-2006-2534
CNNVD-ID N/A
漏洞平台 N/A CVSS评分 N/A
|漏洞来源
https://cxsecurity.com/issue/WLB-2006050131
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
Destiney Links Script v2.1.2 - XSS Vulnv & Full path errors.

Homepage:

http://destiney.com/scripts

Description:

Destiney Links is an Open Source project written in PHP for use with the MySQL Server entity.  Links provides a pre-built, dynamically generated, Link site.  Links counts referrers in and out for listed sites.  Links provides site categorization up to 5 levels dee

Effected Files:

index.php

Exploits:

Almost all files called directly from the /include/ folder and /themes/original/ displays full path disclosure errors.

Input data in the Search and Add a Site forms arent filtered and sanatized. Attacks such as XSS' can occure because of that.

URL injection of index.php can lead to full path disclosure errors.

URL Example:

http://links.destiney.com/index.php?show=pop'

Warning: include(include/pop'.php) [function.include]: failed to open stream: No such file or directory in /home/destiney/domains/examplesite.com/public_html/index.php on line 98

Warning: include() [function.include]: Failed opening 'include/pop'.php' for inclusion (include_path='.:/usr/share/php5:/usr/share/php') in /home/destiney/domains/examplesite.com/public_html/index.php on line 98