发布时间 :2004-10-16 00:00:00
修订时间 :2017-07-10 21:31:10

[原文]Directory traversal vulnerability in index.php in CoolPHP 1.0-stable allows remote attackers to access arbitrary files and execute local PHP scripts via a .. (dot dot) in the op parameter.


        'index.php'对用户提交给"op"参数的数据缺少充分锅炉,提交包含多个'../'的字符作为参数数据,可绕过WEB ROOT限制以系统权限查看文件内容。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20041016 Multiple Vulnerabilities in CoolPHP
(UNKNOWN)  BID  11437
(UNKNOWN)  XF  coolphp-dotdot-directory-traversal(17745)

- 漏洞信息

高危 输入验证
2004-10-16 00:00:00 2006-09-22 00:00:00
        'index.php'对用户提交给"op"参数的数据缺少充分锅炉,提交包含多个'../'的字符作为参数数据,可绕过WEB ROOT限制以系统权限查看文件内容。

- 公告与补丁


- 漏洞信息 (24685)

CoolPHP 1.0 Multiple Remote Input Validation Vulnerabilities (EDBID:24685)
php webapps
2004-10-16 Verified
0 R00tCr4ck
N/A [点击下载]

Reportedly CoolPHP is affected by multiple remote input validation vulnerabilities. These issues are due to a failure of the application to properly sanitize user supplied input prior to using it to make critical actions.

An attacker can leverage these issues to steal cookie-based authentication credentials as well as carry out other malicious activities through cross-site scripting attacks. An attacker can also leverage this issue to execute arbitrary server-side scripts using file include attacks.

Cross-Site Scripting:<script language=javascript>window.alert(document.cookie);</script>;%3C/script%3E<script language=javascript>window.alert(document.cookie);</script>

File Include:		

- 漏洞信息

CoolPHP index.php Arbitrary Command Execution/File Access
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

CoolPHP contains a flaw that allows a remote attacker to include arbitrary files on the remote system, allowing for remote command execution. The issue is due to the index.php script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the 'op' variable. This may allow an attacker to specify an arbitrary file on the system to be read and processed by CoolPHP.

- 时间线

2004-10-16 Unknow
2004-10-16 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者