MF Piadas admin.php 远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110526 漏洞类型 跨站脚本
发布时间 2006-06-27 更新时间 2006-07-03
CVE编号 CVE-2006-3323 CNNVD-ID CNNVD-200606-607
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28117
https://cxsecurity.com/issue/WLB-2006070023
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200606-607
|漏洞详情
MFPiadas是一种WebCGI程序。MFPiadas处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上以Web进程权限执行任意命令。MFPiadas的admin.php脚本没有正确验证page参数的输入,允许攻击者通过包含本地或外部资源的任意文件导致执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/18679/info

MF Piadas is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

http://www.example.com/[scriptpath]/admin/admin.php?page=[code]
|参考资料

来源:XF
名称:mf-piadas-adminadmin-xss(27415)
链接:http://xforce.iss.net/xforce/xfdb/27415
来源:XF
名称:mf-piadas-adminadmin-file-include(27412)
链接:http://xforce.iss.net/xforce/xfdb/27412
来源:BID
名称:18679
链接:http://www.securityfocus.com/bid/18679
来源:BID
名称:18676
链接:http://www.securityfocus.com/bid/18676
来源:BUGTRAQ
名称:20060627[KurdishSecurity#10]MFPiadas1.0RemoteFileIncludeVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/438496/100/0/threaded
来源:VUPEN
名称:ADV-2006-2567
链接:http://www.frsirt.com/english/advisories/2006/2567
来源:SECUNIA
名称:20847
链接:http://secunia.com/advisories/20847
来源:MISC
链接:http://kurdishsecurity.blogspot.com/2006/06/kurdish-security-10-mf-piadas-10.html
来源:OSVDB
名称:26868
链接:http://www.osvdb.org/26868
来源:OSVDB
名称:26867
链接:http://www.osvdb.org/26867
来源:SREASON
名称:1172
链接:http://securityreason.com/securityalert/1172