CVE-2006-1746
CVSS5.0
发布时间 :2006-04-12 18:02:00
修订时间 :2016-05-18 14:38:26
NMCO    

[原文]Directory traversal vulnerability in PHPList 2.10.2 and earlier allows remote attackers to include arbitrary local files via the (1) GLOBALS[database_module] or (2) GLOBALS[language_module] parameters, which overwrite the underlying $GLOBALS variable.


[CNNVD]PHPList 目录遍历漏洞(CNNVD-200604-171)

        PHPList 2.10.2及其早期版本中存在目录遍历漏洞。这使得远程攻击者可以借助于(1) GLOBALS[database_module] 或(2) GLOBALS[language_module]参数包含任意本地文件,这些参数重写隐含的 $GLOBALS变量。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CWE (弱点类目)

CWE-22 [对路径名的限制不恰当(路径遍历)]

- CPE (受影响的平台与产品)

cpe:/a:tincan:phplist:2.6Tincan PHPList 2.6
cpe:/a:tincan:phplist:2.6.5Tincan PHPList 2.6.5
cpe:/a:tincan:phplist:2.8.7Tincan PHPList 2.8.7
cpe:/a:tincan:phplist:2.6.4Tincan PHPList 2.6.4
cpe:/a:tincan:phplist:2.8.2Tincan PHPList 2.8.2
cpe:/a:tincan:phplist:2.10.2Tincan PHPList 2.10.2
cpe:/a:tincan:phplist:2.8.12Tincan PHPList 2.8.12
cpe:/a:tincan:phplist:2.10.1Tincan PHPList 2.10.1
cpe:/a:tincan:phplist:2.6.2Tincan PHPList 2.6.2
cpe:/a:tincan:phplist:2.7.1Tincan PHPList 2.7.1
cpe:/a:tincan:phplist:2.6.1Tincan PHPList 2.6.1
cpe:/a:tincan:phplist:2.6.3Tincan PHPList 2.6.3
cpe:/a:tincan:phplist:2.7.2Tincan PHPList 2.7.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1746
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1746
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-171
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/archive/1/430597
(PATCH)  BUGTRAQ  20060411 Re: PHPList <= 2.10.2 remote commands execution
http://xforce.iss.net/xforce/xfdb/25701
(UNKNOWN)  XF  phplist-index-file-include(25701)
http://www.vupen.com/english/advisories/2006/1296
(UNKNOWN)  VUPEN  ADV-2006-1296
http://www.securityfocus.com/bid/17429
(UNKNOWN)  BID  17429
http://www.securityfocus.com/archive/1/448411
(UNKNOWN)  BUGTRAQ  20061012 new version of phplist fix XSS vulnerability
http://www.securityfocus.com/archive/1/430475/30/30/threaded
(UNKNOWN)  BUGTRAQ  20060410 PHPList <= 2.10.2 remote commands execution
http://tincan.co.uk/?lid=851
(UNKNOWN)  CONFIRM  http://tincan.co.uk/?lid=851
http://securitytracker.com/id?1015889
(UNKNOWN)  SECTRACK  1015889
http://downloads.securityfocus.com/vulnerabilities/exploits/PHPList-lfi.php
(UNKNOWN)  MISC  http://downloads.securityfocus.com/vulnerabilities/exploits/PHPList-lfi.php

- 漏洞信息

PHPList 目录遍历漏洞
中危 路径遍历
2006-04-12 00:00:00 2006-10-19 00:00:00
远程  
        PHPList 2.10.2及其早期版本中存在目录遍历漏洞。这使得远程攻击者可以借助于(1) GLOBALS[database_module] 或(2) GLOBALS[language_module]参数包含任意本地文件,这些参数重写隐含的 $GLOBALS变量。

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://tincan.co.uk/phplist
        

- 漏洞信息

24637
phpList index.php GLOBALS Parameter Traversal Local File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

- 时间线

2006-04-10 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 2.10.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站