漏洞信息详情
Jean-Christophe Ramos SCRIPT BANNIERES modules/bannieres/bannieres.php PHP远程文件包含漏洞
漏洞简介
** 争议 ** Jean-Christophe Ramos SCRIPT BANNIERES(又称ban 0.1和PLS-Bannieres 1.21)中的modules/bannieres/bannieres.php存在PHP远程文件包含漏洞,远程攻击者可通过在chemin参数内的URL执行任意PHP代码。注:其他研究者对此问题有争议,他们观察到$chemin是在使用之前定义的。
漏洞公告
参考网址
来源: BUGTRAQ 名称: 20061101 Re: PLS-Bannieres 1.21 (bannieres.php) File Include 链接:http://www.securityfocus.com/archive/1/archive/1/450297/100/200/threaded 来源: BUGTRAQ 名称: 20061028 Re: Ban v0.1 (bannieres.php) File Include 链接:http://www.securityfocus.com/archive/1/archive/1/449955/100/200/threaded 来源: BUGTRAQ 名称: 20061027 PLS-Bannieres 1.21 (bannieres.php) File Include 链接:http://www.securityfocus.com/archive/1/archive/1/449927/100/200/threaded 来源: BUGTRAQ 名称: 20061027 Ban v0.1 (bannieres.php) File Include 链接:http://www.securityfocus.com/archive/1/archive/1/449910/100/200/threaded 来源: XF 名称: plsbannieres-bannieres-file-include(29856) 链接:http://xforce.iss.net/xforce/xfdb/29856 来源: BID 名称: 20772 链接:http://www.securityfocus.com/bid/20772
受影响实体
- Jean-Christophe_ramos Pls-Bannieres:1.21<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...