JAF CMS目录遍历运行脚本代码执行和信息泄漏漏洞

漏洞信息详情

JAF CMS目录遍历运行脚本代码执行和信息泄漏漏洞

漏洞简介

Just Another Flat file(JAF) CMS 3.0RC的 index.php存在目录遍历漏洞。远程攻击者可以借助show参数中的..(点 点)读取任意文件并可能执行PHP代码。

漏洞公告

The vendor has released a fixed version of 3.0 RC to resolve this issue:
Salims Softhouse JAF CMS 1.0

Salims Softhouse JAF CMS 1.5

Salims Softhouse JAF CMS 2.0

Salims Softhouse JAF CMS 2.0.5

Salims Softhouse JAF CMS 2.1 .0

Salims Softhouse JAF CMS 2.5

Salims Softhouse JAF CMS 3.0 RC

参考网址

来源: XF
名称: jaf-cms-file-inlcude(17983)
链接:http://xforce.iss.net/xforce/xfdb/17983

来源: BID
名称: 11627
链接:http://www.securityfocus.com/bid/11627

来源: SECUNIA
名称: 13104
链接:http://secunia.com/advisories/13104

来源: BUGTRAQ
名称: 20041109 Vulnerabilities in JAF CMS
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=110004150430309&w=2

来源: echo.or.id
链接:http://echo.or.id/adv/adv08-y3dips-2004.txt

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享