来源:自学PHP网 时间:2015-04-17 13:03 作者: 阅读:次
[导读] 标题:webgrind 1.0 (file param) Local File Inclusion Vulnerability作者: Joakim Nygard and Jacob Oettinger开发者: http://code.google.com/p/webgrind影响版本: 1.0 (v1.02 in trunk on......
标题:webgrind 1.0 (file param) Local File Inclusion Vulnerability
作者: Joakim Nygard and Jacob Oettinger 开发者: http://code.google.com/p/webgrind 影响版本: 1.0 (v1.02 in trunk on github) 摘要: Webgrind is an Xdebug profiling web frontend in PHP5. Desc: webgrind suffers from a file inlcusion vulnerability (LFI) when input passed thru the 'file' parameter to index.php is not properly verified before being used to include files. This can be exploited to include files from local resources with directory traversal attacks and URL encoded NULL bytes. ---------------------------------------- /index.php: ----------- 122: case 'fileviewer': 123: $file = get('file'); 124: $line = get('line'); ---------------------------------------- 测试平台: Microsoft Windows XP Professional SP3 (EN) Apache 2.2.21 PHP 5.3.9 MySQL 5.5.20 缺陷发现者: Michael Meyer michael.meyer greenbone net --- http://www.2cto.com /webgrind/index.php?file=/etc/passwd&op=fileviewer http://www.2cto.com /webgrind/index.php?file=/boot.ini&op=fileviewer 修复: 请参考本站www.2cto.com前文 |
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com