PHPBook邮件字段PHP代码注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109571 漏洞类型 输入验证
发布时间 2005-12-29 更新时间 2006-01-04
CVE编号 CVE-2006-0075 CNNVD-ID CNNVD-200601-002
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/26999
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200601-002
|漏洞详情
PhpBook1.3.2及更早版本中的直接静态代码注入漏洞,可让远程攻击者通过写入PHP文件的新消息中的电子邮件字段(邮件变量)执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/16106/info

phpBook is prone to a vulnerability that may let remote attackers inject arbitrary PHP code into the application. This code may then be executed by visiting pages that include the injected code. 

E-mail field: qwe@<? anyphpcode(); ?>.com
|参考资料

来源:BID
名称:16106
链接:http://www.securityfocus.com/bid/16106
来源:BUGTRAQ
名称:20060101[eVuln]phpBookPHPCodeExecution
链接:http://www.securityfocus.com/archive/1/archive/1/420698/100/0/threaded
来源:VUPEN
名称:ADV-2006-0002
链接:http://www.frsirt.com/english/advisories/2006/0002
来源:MISC
链接:http://evuln.com/vulns/6/summary.html
来源:SECUNIA
名称:18268
链接:http://secunia.com/advisories/18268