Torrential Getdox.PHP 目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109282 漏洞类型 路径遍历
发布时间 2005-11-22 更新时间 2006-09-22
CVE编号 CVE-2005-4160 CNNVD-ID CNNVD-200512-203
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/26549
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200512-203
|漏洞详情
Torrential1.2中的getdox.php存在目录遍历漏洞,远程攻击者可以通过在查询字符串参数中的"../"序列来读取任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/15530/info

Torrential is prone to a directory traversal vulnerability. This is due to a lack of proper sanitization of user-supplied input.

An attacker can exploit this issue to retrieve arbitrary remote PHP code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access.

Torrential Version 1.2 is vulnerable; other versions may also be vulnerable. 

http://www.example.com/torrential/dox/getdox.php/../forums.php
http://www.example.com/torrential/dox/getdox.php/../../index.html
|参考资料

来源:XF
名称:torrential-getdox-directory-traversal(23219)
链接:http://xforce.iss.net/xforce/xfdb/23219
来源:BID
名称:15530
链接:http://www.securityfocus.com/bid/15530
来源:BUGTRAQ
名称:20051209Torrential1.2DirectoryTraversal
链接:http://www.securityfocus.com/archive/1/archive/1/419103/100/0/threaded
来源:OSVDB
名称:21305
链接:http://www.osvdb.org/21305
来源:SECTRACK
名称:1015338
链接:http://securitytracker.com/id?1015338