GeSHi XML Parsing 'geshi.php'远程拒绝服务漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1116781 漏洞类型 资源管理错误
发布时间 2008-11-20 更新时间 2008-11-21
CVE编号 CVE-2008-5185 CNNVD-ID CNNVD-200811-344
漏洞平台 Multiple CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/32596
https://www.securityfocus.com/bid/32377
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200811-344
|漏洞详情
GeSHi是用php编写的通用语法荧光笔,是一个编程辅助工具,支持PHP、HTML、C等语言。GeSHi1.0.8之前的版本中的geshi.php的加强功能,允许远程攻击者借助包含一个只有开放的分隔符没有关闭的分隔符的一个XML序列,引起拒绝服务(无限循环),例如使用"<"。
|漏洞EXP
source: http://www.securityfocus.com/bid/32377/info

GeSHi is prone to a remote denial-of-service vulnerability.

Remote attackers can exploit this issue to cause the vulnerable application to enter an infinite loop, consuming excessive resources.

This issue affects versions prior to GeSHi 1.0.8. 

The following example exploit is available:

<
|受影响的产品
GeSHi GeSHi 1.0.7 .3 GeSHi GeSHi 1.0.7 .2 GeSHi GeSHi 1.0.7 .1 GeSHi GeSHi 1.0.7 GeSHi GeSHi 1.0.6 GeSHi GeSHi 1.0.5 GeSHi GeSHi 1.0.4 GeSH
|参考资料

来源:XF
名称:geshi-xml-dos(46769)
链接:http://xforce.iss.net/xforce/xfdb/46769
来源:BID
名称:32377
链接:http://www.securityfocus.com/bid/32377
来源:MLIST
名称:[oss-security]20081120CVEidrequest:anothergeshiissue(was:[oss-security]GeSHi:Clarificationabouttherecentsecurity(non-)issues(SA32559))
链接:http://www.openwall.com/lists/oss-security/2008/11/20/4
来源:geshi.svn.sourceforge.net
链接:http://geshi.svn.sourceforge.net/viewvc/geshi/trunk/geshi-1.0.X/src/geshi.php?r1=1321&r2=1322&view=patch