Invision Power Board search.php脚本代码注入漏洞

漏洞信息详情

Invision Power Board search.php脚本代码注入漏洞

漏洞简介

Invision Power Board是一款流行的PHP论坛程序。

Invision Power Board的search.php脚本处理变量时存在输入验证漏洞,远程攻击者可能利用此漏洞注入PHP代码获取执行。

在preg_replace()中使用之前Invision Power Board没有正确的过滤search.php中对lastdate参数的过滤,导致可以通过样式修改符\”e\”注入任意PHP代码。

sources/action_public/search.php 1261行漏洞代码:

$this->output = preg_replace( \

\”#(value=[\\”\’\’]{$this->ipsclass->input[\’\’lastdate\’\’]}[\\”\’\’])#i\”, \”\\1 \

selected=\’\’selected\’\’\”, $this->output );

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

http://forums.invisionpower.com/index.php?showtopic=213374

参考网址

来源: forums.invisionpower.com

链接:http://forums.invisionpower.com/index.php?showtopic=213374

来源: BID

名称: 17695

链接:http://www.securityfocus.com/bid/17695

来源: BUGTRAQ

名称: 20060425 Invision Vulnerabilities, including remote code execution

链接:http://www.securityfocus.com/archive/1/archive/1/431990/100/0/threaded

来源: XF

名称: invision-search-file-include(26070)

链接:http://xforce.iss.net/xforce/xfdb/26070

来源: BUGTRAQ

名称: 20060710 Re: RE: Invision Vulnerabilities, including remote code execution

链接:http://www.securityfocus.com/archive/1/archive/1/439607/100/0/threaded

来源: BUGTRAQ

名称: 20060427 Invision Power Board 2.1.5 POC

链接:http://www.securityfocus.com/archive/1/archive/1/432451/100/0/threaded

来源: BUGTRAQ

名称: 20060427 Re: Invision Vulnerabilities, including remote code execution

链接:http://www.securityfocus.com/archive/1/archive/1/432226/100/0/threaded

来源: OSVDB

名称: 25005

链接:http://www.osvdb.org/25005

来源: VUPEN

名称: ADV-2006-1534

链接:http://www.frsirt.com/english/advisories/2006/1534

来源: SREASON

名称: 796

链接:http://securityreason.com/securityalert/796

来源: SECUNIA

名称: 19830

链接:http://secunia.com/advisories/19830

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享