发布时间 :2005-12-01 01:03:00
修订时间 :2008-10-03 00:41:44

[原文]Directory traversal vulnerability in main.php in PHPAlbum 0.2.3 and earlier allows remote attackers to read arbitrary files via the (1) cmd and (2) var1 parameters.


        PHPAlbum 0.2.3 及之前颁本的main.php存在目录遍历漏洞,远程攻击者可以通过 (1) cmd和(2) var1 参数读任意文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  15651

- 漏洞信息

中危 路径遍历
2005-12-01 00:00:00 2005-12-01 00:00:00
        PHPAlbum 0.2.3 及之前颁本的main.php存在目录遍历漏洞,远程攻击者可以通过 (1) cmd和(2) var1 参数读任意文件。

- 公告与补丁


- 漏洞信息

phpAlbum main.php Multiple Parameter Traversal Arbitrary File Access
Remote / Network Access Input Manipulation
Impact Unknown Solution Unknown
Exploit Public Uncoordinated Disclosure

- 漏洞描述

phpAlbum contains a flaw that allows a remote attacker to view files and execute unauthorized php code outside of the web path. The issue is due to the 'main.php' script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the 'cmd' or 'var1' variable(s).

- 时间线

2005-11-30 Unknow
Unknow Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

- 漏洞信息

PHPAlbum Local File Include Vulnerability
Access Validation Error 15651
Yes No
2005-11-30 12:00:00 2008-11-05 05:15:00
Discovered by rakstija r0t3d3Vil.

- 受影响的程序版本 phpalbum 0.2.3 phpalbum 4.1 phpalbum 4.1.14

- 不受影响的程序版本 phpalbum 4.1.14

- 漏洞讨论

phpAlbum is prone to a local file-include vulnerability.

An attacker may leverage this issue to execute arbitrary server-side script code that resides on an affected computer with the privileges of the webserver process.

Note that this issue may also be leveraged to read arbitrary files on an affected computer with the privileges of the webserver.

phpAlbum 0.2.3 and prior versions are vulnerable.

- 漏洞利用

No exploit is required.

The following proof-of-concept examples are available:

- 解决方案

The vendor released an update to address this issue. Please see the references for more information.

- 相关参考