Invision Power Board action_admin/paysubscriptions.php 目录遍历漏洞

漏洞信息详情

Invision Power Board action_admin/paysubscriptions.php 目录遍历漏洞

漏洞简介

20060425之前的Invision Power Board (IPB) 2.1.x和2.0.x版本中的action_admin/paysubscriptions.php中存在目录遍历漏洞。这使得远程攻击者可以借助于name参数中的..(两个点)包含并执行任意本地PHP文件,在..之前有足够多的空格字符(\\%08)以擦除文件名中的初始静态部分。

漏洞公告

参考网址

来源: forums.invisionpower.com

链接:http://forums.invisionpower.com/index.php?showtopic=213374

来源: BUGTRAQ

名称: 20060425 Invision Vulnerabilities, including remote code execution

链接:http://www.securityfocus.com/archive/1/archive/1/431990/100/0/threaded

来源: XF

名称: invision-admin-file-include(26072)

链接:http://xforce.iss.net/xforce/xfdb/26072

来源: BUGTRAQ

名称: 20060710 Re: RE: Invision Vulnerabilities, including remote code execution

链接:http://www.securityfocus.com/archive/1/archive/1/439607/100/0/threaded

来源: BUGTRAQ

名称: 20060427 Re: Invision Vulnerabilities, including remote code execution

链接:http://www.securityfocus.com/archive/1/archive/1/432226/100/0/threaded

来源: OSVDB

名称: 25008

链接:http://www.osvdb.org/25008

来源: VUPEN

名称: ADV-2006-1534

链接:http://www.frsirt.com/english/advisories/2006/1534

来源: SREASON

名称: 796

链接:http://securityreason.com/securityalert/796

来源: SECUNIA

名称: 19830

链接:http://secunia.com/advisories/19830

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享