WinHKI远程目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109803 漏洞类型 路径遍历
发布时间 2006-02-24 更新时间 2006-08-28
CVE编号 CVE-2006-1323 CNNVD-ID CNNVD-200603-334
漏洞平台 PHP CVSS评分 5.1
|漏洞来源
https://www.exploit-db.com/exploits/27450
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200603-334
|漏洞详情
在WinHKI1.6及其早期版本中存在目录遍历漏洞,用户协助式攻击者可通过以下途径覆盖任意文件:(1)RAR,(2)TAR,(3)ZIP,或(4)TAR.GZ文档,其文件名包含有".."序列。
|漏洞EXP
source: http://www.securityfocus.com/bid/17153/info

Reportedly, an attacker can carry out directory-traversal attacks. These issues present themselves when the application processes malformed archives. 

A successful attack can allow the attacker to place potentially malicious files and overwrite files on a computer in the context of the user running the affected application. A successful exploit may aid in further attacks.

https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/27450.zip
|参考资料

来源:XF
名称:winhki-extract-directory-traversal(25335)
链接:http://xforce.iss.net/xforce/xfdb/25335
来源:BID
名称:17153
链接:http://www.securityfocus.com/bid/17153
来源:BUGTRAQ
名称:20060322WinHKI1.6xArchiveExtractionDirectorytraversal
链接:http://www.securityfocus.com/archive/1/archive/1/428433/100/0/threaded
来源:VUPEN
名称:ADV-2006-1010
链接:http://www.frsirt.com/english/advisories/2006/1010
来源:SECUNIA
名称:19296
链接:http://secunia.com/advisories/19296
来源:MISC
链接:http://hamid.ir/security/winhki.txt