Flatnuke Index.PHP 目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109045 漏洞类型 路径遍历
发布时间 2005-08-31 更新时间 2009-04-03
CVE编号 CVE-2005-2813 CNNVD-ID CNNVD-200509-064
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/26212
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200509-064
|漏洞详情
FlatNuke2.5.6版本(可能包括以前版本)中的目录遍历漏洞允许远程攻击者通过id参数的".."(参数中包含'..')序列和"%00"字符(空字节后缀)读取index.php的mod参数。
|漏洞EXP
source: http://www.securityfocus.com/bid/14702/info

FlatNuke is prone to a directory traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An unauthorized user can retrieve arbitrary files by supplying directory traversal strings '../' to the vulnerable parameter.

Exploitation of this vulnerability could lead to a loss of confidentiality. Information obtained may aid in further attacks against the underlying system; other attacks are also possible. 

http://www.example.com/index.php?mod=read&id=../forum/users/[user].php%00
|参考资料

来源:BID
名称:14702
链接:http://www.securityfocus.com/bid/14702
来源:SECTRACK
名称:1014824
链接:http://securitytracker.com/id?1014824
来源:SECUNIA
名称:16650
链接:http://secunia.com/advisories/16650/
来源:BUGTRAQ
名称:20050830Flatnuke2.5.6(possiblypriorversions)Underlyingsysteminformationdisclosure/Administrative&userscredentialsdisclosure
链接:http://seclists.org/lists/bugtraq/2005/Aug/0440.html
来源:BID
名称:15796
链接:http://www.securityfocus.com/bid/15796
来源:BUGTRAQ
名称:20051210Flatnuke2.5.6privilegeescalation/remotecommandsexecutionexploit
链接:http://www.securityfocus.com/archive/1/archive/1/419107/100/0/threaded
来源:SECTRACK
名称:1015339
链接:http://securitytracker.com/id?1015339