漏洞信息详情
phpBB XS 输入验证漏洞
漏洞简介
phpBB XS是一款基于PHP的论坛程序
phpBB XS在处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上以Web进程权限执行任意命令。
phpBB XS的bb_usage_stats/includes/bb_usage_stats.php脚本没有正确验证phpbb_root_path参数的输入数据,允许攻击者通过包含本地或外部资源的任意文件导致执行任意代码。成功攻击要求打开了register_globals。bb_usage_stats.php中漏洞代码如下:
line 24 include($phpbb_root_path . \'\'bb_usage_stats/includes/bb_usage_stats_constants.\'\' . $phpEx);
line 25 include($phpbb_root_path . \'\'bb_usage_stats/language/lang_\'\' . $board_config[\'\'default_lang\'\'] . \'\'/bb_usage_stats_lang.\'\' . $phpEx);
line 26 include($phpbb_root_path . \'\'bb_usage_stats/includes/bb_usage_stats_functions.\'\' . $phpEx);
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
http://www.phpbbxs.eu/index.php
参考网址
来源: BID
名称: 20046
链接:http://www.securityfocus.com/bid/20046
来源: BUGTRAQ
名称: 20060915 SolpotCrew Advisory #10 - phpBB XS (phpbb_root_path) Remote File Include
链接:http://www.securityfocus.com/archive/1/archive/1/446108/100/0/threaded
来源: VUPEN
名称: ADV-2006-3654
链接:http://www.frsirt.com/english/advisories/2006/3654
来源: SECUNIA
名称: 21970
链接:http://secunia.com/advisories/21970
来源: MISC
链接:http://nyubicrew.org/adv/Noge_adv_02.txt
来源: BUGTRAQ
名称: 20061123 Re: SolpotCrew Advisory #10 - phpBB XS (phpbb_root_path) Remote File Include
链接:http://www.securityfocus.com/archive/1/archive/1/452469/100/200/threaded
来源: OSVDB
名称: 28918
链接:http://www.osvdb.org/28918
来源: SREASON
名称: 1617
链接:http://securityreason.com/securityalert/1617
受影响实体
- Phpbb_xs Phpbb_xs:0.58<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...