网站地图    收藏   

主页 > 后端 > 网站安全 >

phpliteadmin <= 1.9.3远程PHP代码注射 - 网站安全

来源:自学PHP网    时间:2015-04-17 11:59 作者: 阅读:

[导读] 标题: phpliteadmin = 1.9.3 Remote PHP Code Injection Vulnerability作者: L@usch - http://la.usch.io - http://la.usch.io/files/exploits/phpliteadmin-1.9.3.txt下载地址: http://phplite......

标题: phpliteadmin <= 1.9.3 Remote PHP Code Injection Vulnerability
作者: L@usch - http://la.usch.io - http://la.usch.io/files/exploits/phpliteadmin-1.9.3.txt
下载地址: http://phpliteadmin.googlecode.com/files/phpliteadmin_v1-9-3.zip
版本: 1.9.3
测试平台系统: Windows and Linux
 
概述:
 
phpliteadmin.php#1784: 'Creating a New Database' =>
phpliteadmin.php#1785: 'When you create a new database, the name you entered will be appended with the appropriate file extension (.db, .db3, .sqlite, etc.) if you do not include it yourself. The database will be created in the directory you specified as the $directory variable.',
 
An Attacker can create a sqlite Database with a php extension and insert PHP Code as text fields. When done the Attacker can execute it simply by access the database file with the Webbrowser.
 
测试证明
 
1. We create a db named "hack.php".
(Depending on Server configuration sometimes it will not work and the name for the db will be "hack.sqlite". Then simply try to rename the database / existing database to "hack.php".)
The script will store the sqlite database in the same directory as phpliteadmin.php.
Preview: http://goo.gl/B5n9O
Hex preview: http://goo.gl/lJ5iQ
 
2. Now create a new table in this database and insert a text field with the default value:
<?php phpinfo()?>
Hex preview: www.2cto.com http://goo.gl/v7USQ
 
3. Now we run hack.php
 
Done!
 
Proof: http://goo.gl/ZqPVL
 

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论