PHP-Nuke Image标记管理命令执行漏洞

PHP-Nuke Image标记管理命令执行漏洞

漏洞ID 1107798 漏洞类型 输入验证
发布时间 2004-03-16 更新时间 2005-10-20
图片[1]-PHP-Nuke Image标记管理命令执行漏洞-安全小百科CVE编号 CVE-2004-1842
图片[2]-PHP-Nuke Image标记管理命令执行漏洞-安全小百科CNNVD-ID CNNVD-200412-738
漏洞平台 PHP CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/23835
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200412-738
|漏洞详情
PHP-Nuke是一个广为流行的网站创建和管理工具,它可以使用很多数据库软件作为后端,比如MySQL、PostgreSQL、mSQL、Interbase、Sybase等。PHP-Nuke在处理POST中的bbCode标记时存在设计错误,远程攻击者可以利用这个漏洞执行远程管理命令。PHP-Nuke使用bbCode标记进行图象,HTML等支持,但对用户指定的任意Image标记处理不正确,可导致执行任意远程命令,如攻击者可以提交恶意POST请求从数据库中增加或删除用户。
|漏洞EXP
source: http://www.securityfocus.com/bid/9895/info

It has been reported that PHP-Nuke is prone to a remote admin command execution vulnerability. This issue is due to a design error that allows an attacker to specify arbitrary URI values in bbCode tags contained within posts.

This issue may be leveraged to force an admin user viewing a malicious post to perform some query to the affected application such as adding a user or removing arbitrary data from the database.

The following URI, when inserted between the '[img]' tags and viewed by an admin user will cause the creation of a new admin user:
[img]http://www.example.com/admin.php?op=AddAuthor&add_aid=attacker&add_name=God&add_pwd=coolpass&[email protected]&add_radminsuper=1[/img]
|参考资料

来源:XF
名称:phpnuke-img-gain-privileges(15596)
链接:http://xforce.iss.net/xforce/xfdb/15596
来源:BID
名称:9895
链接:http://www.securityfocus.com/bid/9895
来源:SECUNIA
名称:11195
链接:http://secunia.com/advisories/11195
来源:BUGTRAQ
名称:20040322[waraxe-2004-SA#008-easywaytogetsuperadminrightsinPhpNuke6.x-7.1.0]
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=108006309112075&w;=2
来源:NSFOCUS
名称:6194
链接:http://www.nsfocus.net/vulndb/6194

相关推荐: Messagerie 1.0 – Arbitrary User Removal Denial of Service

Messagerie 1.0 – Arbitrary User Removal Denial of Service 漏洞ID 1053582 漏洞类型 发布时间 2002-04-27 更新时间 2002-04-27 CVE编号 N/A CNNVD-ID N/A…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享