PBLang SetCookie.PHP目录遍历漏洞

PBLang SetCookie.PHP目录遍历漏洞

漏洞ID 1109058 漏洞类型 路径遍历
发布时间 2005-09-07 更新时间 2005-10-20
图片[1]-PBLang SetCookie.PHP目录遍历漏洞-安全小百科CVE编号 CVE-2005-2892
图片[2]-PBLang SetCookie.PHP目录遍历漏洞-安全小百科CNNVD-ID CNNVD-200509-132
漏洞平台 PHP CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/26231
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200509-132
|漏洞详情
PBLang是一个基于PHP支持国际化的BBS系统。它不需要任何数据库,数据全部存储在文件系统中。PBLang4.65以及之前较早版本的setcookie.php中含有目录遍历漏洞,远程攻击者可以通过U参数中的”..”(参数中包含’..’)序列和”%00″(空字节后缀)来读取任意的文件。
|漏洞EXP
source: http://www.securityfocus.com/bid/14765/info

PBLang is affected by a directory traversal vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

Exploitation of this vulnerability could lead to a loss of confidentiality. Information obtained may aid in further attacks against the underlying system; other attacks are also possible. 

http://www.example.com/pblang/setcookie.php?u=../../../../../etc/passwd%00
|参考资料

来源:XF
名称:pblang-directory-traversal(22185)
链接:http://xforce.iss.net/xforce/xfdb/22185
来源:BID
名称:14765
链接:http://www.securityfocus.com/bid/14765
来源:SECTRACK
名称:1014861
链接:http://securitytracker.com/alerts/2005/Sep/1014861.html
来源:SECUNIA
名称:16711
链接:http://secunia.com/advisories/16711/
来源:BUGTRAQ
名称:20050907PBLang4.65(possiblypriorversions)remotecodeexecution/administrativecredentialsdisclosure/systeminformationdisclosure/crosssitescripting/pathdisclosure
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=112611338417979&w;=2

相关推荐: IM-Switch Insecure Temporary File Handling Symbolic Link Vulnerability

IM-Switch Insecure Temporary File Handling Symbolic Link Vulnerability 漏洞ID 1098205 漏洞类型 Access Validation Error 发布时间 2004-07-13 更…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享