网站地图    收藏   

主页 > 后端 > 网站安全 >

MobileCartly 1.0 远程代码执行及任意文件删除漏洞

来源:自学PHP网    时间:2015-04-17 13:03 作者: 阅读:

[导读] MobileCartly 1.0 = 远程代码执行作者: Jean Pascal Pereira pereira@secbiz.de程序介绍MobileCartly is an Open Source Mobile Shopping Cart Software.Vendor URI: http://www.mobileca......

MobileCartly 1.0 <= 远程代码执行
作者: Jean Pascal Pereira <pereira@secbiz.de>
 
程序介绍
 
"MobileCartly is an Open Source Mobile Shopping Cart Software."
 
Vendor URI: http://www.mobilecartly.com
 
风险等级: High
 
程序受远程代码执行漏洞影响
 
www.2cto.com 
shoppingcart/add.php, line 9:
 
if( isset( $_COOKIE['MCCHECKOUT'] ) ) {
$checkout = unserialize($_COOKIE['MCCHECKOUT']);
$checkout[] = $product;
 
setcookie('MCCHECKOUT', serialize($checkout), time()+10800);
 
-------------------------------------
 
解决方案:
 
Perform some input validation to get control over the serialized data.
As end-user you should at least keep your PHP version up to date.
 
2。标题: MobileCartly 1.0 <= 任意文件删除
 
作者: GoLd_M
下载: http://mobilecartly.com/mobilecartly.zip
影响版本: 1.0
# Category:: Arbitrary Delete Vulnerability
测试平台: Xp SP 2
测试方法:  [MobileCartly 1.0]/includes/deletepage.php?deletepage=../[File]
# Code Page /includes/deletepage.php
# <?
#
# $page = "../pages/" . $_REQUEST['deletepage']; <<---XXX
#
# unlink($page); <<---XXX[Booooom]
#
#
# ?>

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论