phpBB XS 输入验证漏洞

漏洞信息详情

phpBB XS 输入验证漏洞

漏洞简介

phpBB XS是一款基于PHP的论坛程序

phpBB XS在处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上以Web进程权限执行任意命令。

phpBB XS的bb_usage_stats/includes/bb_usage_stats.php脚本没有正确验证phpbb_root_path参数的输入数据,允许攻击者通过包含本地或外部资源的任意文件导致执行任意代码。成功攻击要求打开了register_globals。bb_usage_stats.php中漏洞代码如下:

line 24 include($phpbb_root_path . \’\’bb_usage_stats/includes/bb_usage_stats_constants.\’\’ . $phpEx);

line 25 include($phpbb_root_path . \’\’bb_usage_stats/language/lang_\’\’ . $board_config[\’\’default_lang\’\’] . \’\’/bb_usage_stats_lang.\’\’ . $phpEx);

line 26 include($phpbb_root_path . \’\’bb_usage_stats/includes/bb_usage_stats_functions.\’\’ . $phpEx);

漏洞公告

目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:

http://www.phpbbxs.eu/index.php

参考网址

来源: BID

名称: 20046

链接:http://www.securityfocus.com/bid/20046

来源: BUGTRAQ

名称: 20060915 SolpotCrew Advisory #10 – phpBB XS (phpbb_root_path) Remote File Include

链接:http://www.securityfocus.com/archive/1/archive/1/446108/100/0/threaded

来源: VUPEN

名称: ADV-2006-3654

链接:http://www.frsirt.com/english/advisories/2006/3654

来源: SECUNIA

名称: 21970

链接:http://secunia.com/advisories/21970

来源: MISC

链接:http://nyubicrew.org/adv/Noge_adv_02.txt

来源: BUGTRAQ

名称: 20061123 Re: SolpotCrew Advisory #10 – phpBB XS (phpbb_root_path) Remote File Include

链接:http://www.securityfocus.com/archive/1/archive/1/452469/100/200/threaded

来源: OSVDB

名称: 28918

链接:http://www.osvdb.org/28918

来源: SREASON

名称: 1617

链接:http://securityreason.com/securityalert/1617

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享