漏洞信息详情
Carbonize Lazarus Guestbook template.class.php 远程文件包含漏洞
漏洞简介
Carbonize Lazarus Guestbook 1.7.3之前的版本中的template.class.php存在PHP远程文件包含漏洞。远程攻击者可以借助提交到admin.php的include_path参数中的一个URL,执行任意的PHP代码。它可能源于动态变量评估漏洞。
漏洞公告
参考网址
来源: BUGTRAQ 名称: 20070308 Re: [Bogus] Lazarus Guestbook (admin.php)Remote File Include Expliot - 链接:http://www.securityfocus.com/archive/1/archive/1/462235/100/100/threaded 来源: BUGTRAQ 名称: 20070307 Lazarus Guestbook (admin.php)Remote File Include Expliot 链接:http://www.securityfocus.com/archive/1/archive/1/462183/100/100/threaded 来源: VUPEN 名称: ADV-2007-0874 链接:http://www.frsirt.com/english/advisories/2007/0874 来源: VIM 名称: 20070307 Bogus - [c_r_ck at hotmail.com: Lazarus Guestbook (admin.php)Remote File Include Expliot] 链接:http://www.attrition.org/pipermail/vim/2007-March/001417.html 来源: carbonize.co.uk 链接:http://carbonize.co.uk/Lazarus/Forum/index.php?topic=1164.0 来源: BUGTRAQ 名称: 20070520 Re: Re: [Bogus] Lazarus Guestbook (admin.php)Remote File Include Expliot - 链接:http://www.securityfocus.com/archive/1/archive/1/469218/100/0/threaded 来源: BUGTRAQ 名称: 20070316 Re: [Bogus] Lazarus Guestbook (admin.php)Remote File Include Expliot 链接:http://www.securityfocus.com/archive/1/archive/1/463041/100/0/threaded 来源: SREASON 名称: 2432 链接:http://securityreason.com/securityalert/2432
受影响实体
- Carbonize Lazarus_guestbook:1.7.2<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...