CVE-2005-2865
CVSS7.5
发布时间 :2005-09-08 19:03:00
修订时间 :2016-10-17 23:30:59
NMCO    

[原文]Multiple PHP remote file inclusion vulnerabilities in aMember Pro 2.3.4 allow remote attackers to execute arbitrary PHP code via the config[root_dir] parameter to (1) mysql.inc.php, (2) efsnet.inc.php, (3) theinternetcommerce.inc.php, (4) cdg.inc.php, (5) compuworld.inc.php, (6) directone.inc.php, (7) authorize_aim.inc.php, (8) beanstream.inc.php, (9) config.inc.php, (10) eprocessingnetwork.inc.php, (11) eway.inc.php, (12) linkpoint.inc.php, (13) logiccommerce.inc.php, (14) netbilling.inc.php, (15) payflow_pro.inc.php, (16) paymentsgateway.inc.php, (17) payos.inc.php, (18) payready.inc.php, or (19) plugnplay.inc.php.


[CNNVD]aMember Pro多个远程文件包含漏洞(CNNVD-200509-068)

        aMember Pro是一款基于PHP的会员和订阅管理系统。
        aMember Pro 2.3.4版本中多个PHP远程文件包含漏洞允许远程攻击者通过配置[root_dir]参数执行任意PHP代码到以下文件:(1) mysql.inc.php, (2) efsnet.inc.php, (3) theinternetcommerce.inc.php, (4) cdg.inc.php, (5) compuworld.inc.php, (6) directone.inc.php, (7) authorize_aim.inc.php, (8) beanstream.inc.php, (9) config.inc.php, (10) eprocessingnetwork.inc.php, (11) eway.inc.php, (12) linkpoint.inc.php, (13) logiccommerce.inc.php, (14) netbilling.inc.php, (15) payflow_pro.inc.php, (16) paymentsgateway.inc.php, (17) payos.inc.php, (18) payready.inc.php, 或 (19) plugnplay.inc.php。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2865
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2865
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200509-068
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=112605375926801&w=2
(UNKNOWN)  BUGTRAQ  20050905 [NewAngels Advisory] aMember Pro 2.3.X - Remote File Include
http://xforce.iss.net/xforce/xfdb/22157
(UNKNOWN)  XF  amember-file-include(22157)

- 漏洞信息

aMember Pro多个远程文件包含漏洞
高危 未知
2005-09-08 00:00:00 2005-10-20 00:00:00
远程  
        aMember Pro是一款基于PHP的会员和订阅管理系统。
        aMember Pro 2.3.4版本中多个PHP远程文件包含漏洞允许远程攻击者通过配置[root_dir]参数执行任意PHP代码到以下文件:(1) mysql.inc.php, (2) efsnet.inc.php, (3) theinternetcommerce.inc.php, (4) cdg.inc.php, (5) compuworld.inc.php, (6) directone.inc.php, (7) authorize_aim.inc.php, (8) beanstream.inc.php, (9) config.inc.php, (10) eprocessingnetwork.inc.php, (11) eway.inc.php, (12) linkpoint.inc.php, (13) logiccommerce.inc.php, (14) netbilling.inc.php, (15) payflow_pro.inc.php, (16) paymentsgateway.inc.php, (17) payos.inc.php, (18) payready.inc.php, 或 (19) plugnplay.inc.php。
        

- 公告与补丁

        

- 漏洞信息

19439
aMember Pro efsnet.inc.php Remote File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

aMember Pro contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to efsnet.inc.php not properly sanitizing user input supplied to the 'config[root_dir]' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

- 时间线

2005-09-05 Unknow
2005-09-05 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站