Информационная безопасность
[RU] switch to English

Ежедневная сводка ошибок в Web-приложениях (PHP, ASP, JSP, CGI, Perl )
Опубликовано:15 марта 2007 г.
SecurityVulns ID:7409
Уровень опасности:
Описание:Инъекции PHP, инъекции SQL, обратный путь в каталогах, межсайтовый скриптинг, утечка информации и т.д.
Затронутые продукты:WOLTLAB : Woltlab Burning Board 2.7
 HORDE : Horde 3.1
 IMP : IMP 4.1
 ORIONBLOG : Orion-Blog 2.0
 WEBCREATOR : WebCreator 0.2
 CARE2X : CARE2X 1.1
CVE:CVE-2007-1574 (CARE2X 2.2, and possibly earlier, allows remote attackers to obtain configuration information via a direct request to phpinfo.php, which calls the phpinfo function. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.)
 CVE-2007-1473 (Cross-site scripting (XSS) vulnerability in framework/NLS/NLS.php in Horde Framework before 3.1.4 RC1, when the login page contains a language selection box, allows remote attackers to inject arbitrary web script or HTML via the new_lang parameter to login.php.)
 CVE-2007-1471 (admin/default.asp in Orion-Blog 2.0 allows remote attackers to bypass authentication controls and gain privileges via a direct URL request for admin/AdminBlogNewsEdit.asp.)
 CVE-2007-1459 (Multiple PHP remote file inclusion vulnerabilities in WebCreator 0.2.6-rc3 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the moddir parameter to (1) content/load.inc.php, (2) config/load.inc.php, (3) http/load.inc.php, and unspecified other files.)
 CVE-2007-1458 (Multiple PHP remote file inclusion vulnerabilities in CARE2X 1.1 allow remote attackers to execute arbitrary PHP code via a URL in the root_path parameter to (1) inc_checkdate_lang.php, (2) inc_charset_fx.php, (3) inc_config_color.php, (4) inc_currency_set.php, (5) inc_db_makelink.php, (6) inc_diagnostics_report_fx.php, (7) inc_environment_global.php, (8) inc_front_chain_lang.php, (9) inc_init_crypt.php, (10) inc_load_copyrite.php, or (11) inc_news_save.php in include/; (12) diagnostics-report-index.php, (13) config_options_mascot.php, (14) barcode-labels.php, (15) chg-color.php, or (16) config_options_gui_template.php in main/; or unspecified other files.)
Оригинальный текстdocumentMoritz Naumann, [Full-disclosure] Horde 3.1.4 (RC1) fixes XSS issue (15.03.2007)
 documentMoritz Naumann, [Full-disclosure] Horde IMP Webmail Client version H3 (4.1.4) fixes multiple XSS issues (15.03.2007)
 documenterdc_(at)_echo.or.id, [ECHO_ADV_72$2007] CARE2X (root_path) Remote File Inclusion Vulnerability (15.03.2007)
 documenterdc_(at)_echo.or.id, [ECHO_ADV_74$2007] WebCreator <= 0.2.6-rc3 (moddir) Remote File Inclusion Vulnerability (15.03.2007)
 documentx666_(at)_Safe-mail.net, Woltab Burning Board SQL Injection usergroups.php (15.03.2007)
Файлы:Orion-Blog v2.0 Version Remote Privilege Escalation Exploit
 Woltlab Burning Board 2.X usergroups.php SQL Injection exploit

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород