eFiction ‘Index.PHP’认证绕过漏洞

漏洞信息详情

eFiction ‘Index.PHP’认证绕过漏洞

漏洞简介

eFiction 2.0.7之前的版本的index.php脚本允许远程攻击者通过将(1) adminloggedin参数,(2) loggedin参数和 (3) level参数设为\”1\”,绕过认证并获取特权。

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

efiction efiction 1.0

efiction patch08-24-06.zip

http://efiction.org/downloads/patch08-24-06.zip

efiction efiction 1.1

efiction patch08-24-06.zip

http://efiction.org/downloads/patch08-24-06.zip

efiction efiction 2.0

efiction patch08-24-06.zip

http://efiction.org/downloads/patch08-24-06.zip

efiction efiction 2.0.6

efiction patch08-24-06.zip

http://efiction.org/downloads/patch08-24-06.zip

参考网址

来源: BID

名称: 19717

链接:http://www.securityfocus.com/bid/19717

来源: SECUNIA

名称: 21625

链接:http://secunia.com/advisories/21625

来源: efiction.org

链接:http://efiction.org/forums/index.php?topic=3698

来源: MILW0RM

名称: 2255

链接:http://milw0rm.com/exploits/2255

来源: XF

名称: efiction-admin-security-bypass(28595)

链接:http://xforce.iss.net/xforce/xfdb/28595

来源: OSVDB

名称: 28237

链接:http://www.osvdb.org/28237

来源: VUPEN

名称: ADV-2006-3392

链接:http://www.frsirt.com/english/advisories/2006/3392

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享