漏洞信息详情
Invision Power Board search.php脚本代码注入漏洞
- CNNVD编号:CNNVD-200604-514
- 危害等级: 中危
- CVE编号:
CVE-2006-2059
- 漏洞类型:
输入验证
- 发布时间:
2006-04-26
- 威胁类型:
远程
- 更新时间:
2006-04-27
- 厂 商:
invision_power_services - 漏洞来源:
IceShaman Wells -
漏洞简介
Invision Power Board是一款流行的PHP论坛程序。
Invision Power Board的search.php脚本处理变量时存在输入验证漏洞,远程攻击者可能利用此漏洞注入PHP代码获取执行。
在preg_replace()中使用之前Invision Power Board没有正确的过滤search.php中对lastdate参数的过滤,导致可以通过样式修改符\”e\”注入任意PHP代码。
sources/action_public/search.php 1261行漏洞代码:
$this->output = preg_replace( \
\”#(value=[\\”\’\’]{$this->ipsclass->input[\’\’lastdate\’\’]}[\\”\’\’])#i\”, \”\\1 \
selected=\’\’selected\’\’\”, $this->output );
参考网址
来源: forums.invisionpower.com
链接:http://forums.invisionpower.com/index.php?showtopic=213374
来源: BID
名称: 17695
链接:http://www.securityfocus.com/bid/17695
来源: BUGTRAQ
名称: 20060425 Invision Vulnerabilities, including remote code execution
链接:http://www.securityfocus.com/archive/1/archive/1/431990/100/0/threaded
来源: XF
名称: invision-search-file-include(26070)
链接:http://xforce.iss.net/xforce/xfdb/26070
来源: BUGTRAQ
名称: 20060710 Re: RE: Invision Vulnerabilities, including remote code execution
链接:http://www.securityfocus.com/archive/1/archive/1/439607/100/0/threaded
来源: BUGTRAQ
名称: 20060427 Invision Power Board 2.1.5 POC
链接:http://www.securityfocus.com/archive/1/archive/1/432451/100/0/threaded
来源: BUGTRAQ
名称: 20060427 Re: Invision Vulnerabilities, including remote code execution
链接:http://www.securityfocus.com/archive/1/archive/1/432226/100/0/threaded
来源: OSVDB
名称: 25005
来源: VUPEN
名称: ADV-2006-1534
链接:http://www.frsirt.com/english/advisories/2006/1534
来源: SREASON
名称: 796
链接:http://securityreason.com/securityalert/796
来源: SECUNIA
名称: 19830