123 Flash Chat Eval注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109669 漏洞类型 输入验证
发布时间 2006-01-24 更新时间 2006-03-27
CVE编号 CVE-2006-0418 CNNVD-ID CNNVD-200601-319
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/27121
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200601-319
|漏洞详情
123FlashChatServer5.0和5.1中存在Eval注入漏洞,远程攻击者可以通过特制的用户名执行任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/16360/info

123 Flash Chat is prone to an arbitrary code injection weakness.

An attacker can influence the value of a variable that is insecurely passed to an 'eval()' call.

Successful exploitation may allow attackers to take complete control of the application and potentially carry out other attacks against the vulnerable server hosting the client, including remote unauthorized access.

Exploitation of this vulnerability likely depends on the existence of other content injection issues in the site hosting the application. An attacker would exploit other input validation vulnerabilities such as HTML injection or cross-site scripting to supply the malicious value for a variable.

123 Flash Chat 5.1 and prior versions are affected by this issue.

The following string may be supplied as a username to gain administrative privileges:

x;user.name= a;user.name=ADMIN_AVATAR_NAME;
|参考资料

来源:BID
名称:16360
链接:http://www.securityfocus.com/bid/16360
来源:BUGTRAQ
名称:20060124[ISecAuditorsAdvisories]Arbitraryflashcoderemoteexecutionin123flashchat
链接:http://www.securityfocus.com/archive/1/archive/1/423164/100/0/threaded