PHPSlash URL块任意文件泄露漏洞

PHPSlash URL块任意文件泄露漏洞

漏洞ID 1106302 漏洞类型 输入验证
发布时间 2001-04-15 更新时间 2005-05-02
图片[1]-PHPSlash URL块任意文件泄露漏洞-安全小百科CVE编号 CVE-2001-1334
图片[2]-PHPSlash URL块任意文件泄露漏洞-安全小百科CNNVD-ID CNNVD-200205-048
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/20848
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200205-048
|漏洞详情
PHPSlash0.6.1版本的Block_render_url.class存在漏洞。有PHPSlash管理员特权的远程攻击者通过创建空心块和指定目标文件为源URL读取任意文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/2724/info

PHPSlash is a widely used open source Groupware utility.

PHPSlash contains a vulnerability which may disclose files readable to the webserver process on the underlying host to PHPSlash users who can 'edit' URL blocks.

Exploitation may result in attackers gaining local access to the webserver or information which could assist in further attacks. 

Login as admin with GOD permissions
Access the BLOCKS admin section
(blockAdmin.php3) and
create a new block with the following information :

Title : notTrusted
Type : url
Site Location : whatever
Source URL : ./config.php3
Expire Length : 0
Owned by section : home
Data : (empty)
Order number : whatever

It will display the content of the config.php3 as text in
the block of the main page.

It might become an issue if blockAdmin.php3 gives
add/edit/remove permission to some users that are
not
supposed to access the filesystem.
|参考资料

来源:marc.theaimsgroup.com
链接:http://marc.theaimsgroup.com/?l=phpslash&m;=99029398904419&w;=2
来源:BID
名称:2724
链接:http://www.securityfocus.com/bid/2724
来源:XF
名称:phpslash-block-read-files(9990)
链接:http://www.iss.net/security_center/static/9990.php
来源:BUGTRAQ
名称:20010515PHPSlash:potentialvulnerabilityinURLblocks
链接:http://archives.neohapsis.com/archives/bugtraq/2001-05/0126.html

相关推荐: HP Visualize Conference ftp Vulnerability

HP Visualize Conference ftp Vulnerability 漏洞ID 1104672 漏洞类型 Configuration Error 发布时间 1999-06-29 更新时间 1999-06-29 CVE编号 N/A CNNVD-ID…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享