phpMyAdmin export.php文件泄露漏洞

phpMyAdmin export.php文件泄露漏洞

漏洞ID 1107677 漏洞类型 未知
发布时间 2004-02-03 更新时间 2005-05-13
图片[1]-phpMyAdmin export.php文件泄露漏洞-安全小百科CVE编号 CVE-2004-0129
图片[2]-phpMyAdmin export.php文件泄露漏洞-安全小百科CNNVD-ID CNNVD-200403-023
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/23640
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200403-023
|漏洞详情
phpMyAdmin是一个免费工具,为管理MySQL提供了一个WWW管理接口。phpMyAdmin包含的’export.php’脚本对用户提交参数缺少充分过滤,远程攻击者可以利用这个漏洞进行目录遍历攻击。phpMyAdmin包含的’export.php’脚本对用户提交给’what’的参数缺少充分过滤,远程攻击者提交包含多个’../’字符的数据,可绕过WEBROOT限制,以WEB权限查看系统上的任意文件信息。
|漏洞EXP
source: http://www.securityfocus.com/bid/9564/info

phpMyAdmin is prone to a vulnerability that may permit remote attackers to gain access to files that are readable by the hosting web server. The issue is reported to exist in the 'export.php' script and may be exploited by providing directory traversal sequences as an argument for a specific URI parameter. 

http://www.example.com/[phpMyAdmin_directory]/export.php?what=../../../../../../etc/passwd%00
|参考资料

来源:BID
名称:9564
链接:http://www.securityfocus.com/bid/9564
来源:BUGTRAQ
名称:20040203ArbitraryFileDisclosureVulnerabilityinphpMyAdmin2.5.5-pl1andprior
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=107582619125932&w;=2
来源:www.phpmyadmin.net
链接:http://www.phpmyadmin.net/home_page/relnotes.php?rel=0
来源:sourceforge.net
链接:http://sourceforge.net/forum/forum.php?forum_id=350228
来源:GENTOO
名称:GLSA-200402-05
链接:http://security.gentoo.org/glsa/glsa-200402-05.xml
来源:XF
名称:phpmyadmin-dotdot-directory-traversal(15021)
链接:http://xforce.iss.net/xforce/xfdb/15021
来源:OSVDB
名称:3800
链接:http://www.osvdb.org/3800
来源:SECUNIA
名称:10769
链接:http://secunia.com/advisories/10769

相关推荐: Multiple Microsoft Services for Unix 3.0 Interix SDK Vulnerabilities

Multiple Microsoft Services for Unix 3.0 Interix SDK Vulnerabilities 漏洞ID 1101465 漏洞类型 Boundary Condition Error 发布时间 2002-10-03 更新…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享