PHP-Nuke 多个全局变量重写漏洞

漏洞信息详情

PHP-Nuke 多个全局变量重写漏洞

漏洞简介

PHP-Nuke存在全局变量重写漏洞,远程攻击者可通过修改传给管理脚本(1) index.php,(2) admin_ug_auth.php,(3) admin_board.php,(4) admin_disallow.php,(5) admin_forumauth.php,(6) admin_groups.php,(7) admin_ranks.php,(8) admin_styles.php,(9) admin_user_ban.php,(10) admin_words.php,(11) admin_avatar.php,(12) admin_db_utilities.php,(13) admin_forum_prune.php,(14) admin_forums.php,(15) admin_mass_email.php,(16) admin_smilies.php,(17) admin_ug_auth.php和(18) admin_users.php(在$phpbb_root_path初始化为静态值之后,执行import_request_variables函数时,重写$phpbb_root_path)的phpbb_root_path参数来发起远程PHP文件包含攻击。

漏洞公告

参考网址

来源: BUGTRAQ

名称: 20060602 Re: Re: # MHG Security Team — PHP NUKE All version Remote File Inc.

链接:http://www.securityfocus.com/archive/1/archive/1/435705/100/0/threaded

来源: BUGTRAQ

名称: 20060601 Re: # MHG Security Team — PHP NUKE All version Remote File Inc.

链接:http://www.securityfocus.com/archive/1/archive/1/435611/100/0/threaded

来源: BUGTRAQ

名称: 20060531 # MHG Security Team — PHP NUKE All version Remote File Inc.

链接:http://www.securityfocus.com/archive/1/archive/1/435407/100/0/threaded

来源: XF

名称: phpnuke-phpbbrootpath-fileInclude(27368)

链接:http://xforce.iss.net/xforce/xfdb/27368

来源: SREASON

名称: 1040

链接:http://securityreason.com/securityalert/1040

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享