XennoBB 'Profile.PHP'目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110783 漏洞类型 路径遍历
发布时间 2006-08-09 更新时间 2006-10-09
CVE编号 CVE-2006-4161 CNNVD-ID CNNVD-200608-264
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/28364
https://cxsecurity.com/issue/WLB-2006080104
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200608-264
|漏洞详情
XennoBB2.1.0及早期版本中profile.php脚本的avatar_gallery操作存在目录遍历漏洞,远程攻击者可借助category参数(该参数中包含..)读取任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/19446/info

XennoBB is prone to a directory-traversal vulnerability because it fails to properly sanitize user-supplied input. 

An attacker can exploit this vulnerability to retrieve arbitrary files from the vulnerable system in the context of the affected application. Information obtained may aid in further attacks.

XennoBB 2.1.0 and earlier are vulnerable to this issue; other versions may also be affected.

http://www.example.com/profile.php?action=avatar_gallery&id={your registered user ID here}/category=../../general/
|参考资料

来源:XF
名称:xennobb-profile-directory-traversal(28337)
链接:http://xforce.iss.net/xforce/xfdb/28337
来源:MISC
链接:http://www.surfionline.com/security_advisories/20060810_xennobb_avatar_gallery_transversal.txt
来源:BID
名称:19446
链接:http://www.securityfocus.com/bid/19446
来源:BUGTRAQ
名称:20060809XennoBB<="avatargallery"DirectoryTransversal
链接:http://www.securityfocus.com/archive/1/archive/1/442881/100/0/threaded
来源:SECUNIA
名称:21483
链接:http://secunia.com/advisories/21483
来源:SREASON
名称:1395
链接:http://securityreason.com/securityalert/1395