Phorum 3.x – Arbitrary File Read

Phorum 3.x – Arbitrary File Read

漏洞ID 1053488 漏洞类型
发布时间 2000-11-24 更新时间 2000-11-24
图片[1]-Phorum 3.x – Arbitrary File Read-安全小百科CVE编号 N/A
图片[2]-Phorum 3.x – Arbitrary File Read-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/20431
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/1997/info

Phorum is a PHP based web forums package. Due to an error in the handling of user input in administrative scripts, any user can view the any file readable by the webserver on the target host. This is due to user-supplied input being referenced as a filename in two locations in the file common.php.

The ForumLang variable, used to specify a language in which the forum will be displayed, is not checked for "../" character sequences. As a result, it is possible for users to supply a path consisting of "../" sequences followed by an arbitrary file on the filesystem to the script, which will open it and display its contents.

The consequences of this vulnerability being exploited is a disclosure of system information (eg valid accounts). Under certain circumstances, this may also indirectly lead to the attacker gaining local access to the system. 


http://phorum.org/support/common.php?f=0&ForumLang=../../../../../../../etc/resolv.conf

相关推荐: WEBgais Remote Command Execution Vulnerability

WEBgais Remote Command Execution Vulnerability 漏洞ID 1105018 漏洞类型 Input Validation Error 发布时间 1997-07-10 更新时间 1997-07-10 CVE编号 N/A …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享