Wabbit PHP Gallery Dir参数目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111605 漏洞类型 路径遍历
发布时间 2006-11-20 更新时间 2006-12-01
CVE编号 CVE-2006-6185 CNNVD-ID CNNVD-200611-478
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/29145
https://cxsecurity.com/issue/WLB-2006120011
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200611-478
|漏洞详情
WabbitPHPGallery的script.php存在目录遍历漏洞,远程攻击者可以通过传给index.php的dir参数(该参数中包含..)来读取任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/21213/info

Wabbit PHP Gallery is prone to a directory-traversal vulnerability because the application fails to properly sanitize user-supplied input. 

An attacker can exploit this issue to retrieve the contents of arbitrary files in the context of the webserver process. Information obtained may aid in further attacks.

http://www.example.com/index.php?dir=../../../../../../etc/passwd
|参考资料

来源:XF
名称:wabbitphpgallery-index-directory-traversal(30429)
链接:http://xforce.iss.net/xforce/xfdb/30429
来源:BID
名称:21213
链接:http://www.securityfocus.com/bid/21213
来源:BUGTRAQ
名称:20061119WabbitPHPGallery=>0.9RemoteTraversalDirectory
链接:http://www.securityfocus.com/archive/1/archive/1/452170/100/100/threaded
来源:VUPEN
名称:ADV-2006-4640
链接:http://www.frsirt.com/english/advisories/2006/4640
来源:VIM
名称:20061130Wabbitdirectorytraversal-uncertainimpact;enomphpuncertainty
链接:http://www.attrition.org/pipermail/vim/2006-November/001152.html
来源:SECUNIA
名称:22994
链接:http://secunia.com/advisories/22994
来源:SREASON
名称:1939
链接:http://securityreason.com/securityalert/1939