Chyrp includes/lib/gz.php目录遍历漏洞

漏洞信息详情

Chyrp includes/lib/gz.php目录遍历漏洞

漏洞简介

Chyrp是一款开源的基于PHP和MySQL的轻量级博客(Blog)引擎。

Chyrp 2.0及之前版本的includes/lib/gz.php中存在目录遍历漏洞。远程攻击者可借助文件参数中的“..”(点点)操作符读取任意文件。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

http://www.justanotherhacker.com/advisories/JAHx113.txt

http://www.ocert.org/advisories/ocert-2011-001.html

参考网址

来源: XF

名称: chyrp-gz-directory-traversal(68565)

链接:http://xforce.iss.net/xforce/xfdb/68565

来源: BID

名称: 48672

链接:http://www.securityfocus.com/bid/48672

来源: BUGTRAQ

名称: 20110713 [oCERT-2011-001] Chyrp input sanitization errors

链接:http://www.securityfocus.com/archive/1/archive/1/518890/100/0/threaded

来源: MLIST

名称: [oss-security] 20110713 Re: [oCERT-2011-001] Chyrp input sanitization errors

链接:http://www.openwall.com/lists/oss-security/2011/07/13/6

来源: MLIST

名称: [oss-security] 20110713 [oCERT-2011-001] Chyrp input sanitization errors

链接:http://www.openwall.com/lists/oss-security/2011/07/13/5

来源: www.ocert.org

链接:http://www.ocert.org/advisories/ocert-2011-001.html

来源: www.justanotherhacker.com

链接:http://www.justanotherhacker.com/advisories/JAHx113.txt

来源: SECUNIA

名称: 45184

链接:http://secunia.com/advisories/45184

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享