Re: [Bogus] Lazarus Guestbook (admin.php)Remote File Include Exp

看板Bugtraq作者時間19年前 (2007/03/17 04:51), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串2/2 (看更多)
Tom Walsh said: >So... either it is patched in the version I am looking at (unlikely) >or this is a bogus report (like god knows how many others). In this case, it looks legitimate for OLDER versions. See informal analysis below. The cause was dynamic variable evaluation, which is one of the features that make post-disclosure analysis really messy for PHP. Also, the vendor apparently posted the fix for the version that Tom looked at: http://carbonize.co.uk/Lazarus/Forum/index.php?topic=1164.0 The vendor calls it "XSS" which is a typical confusion with RFI, but review of the code change shows it's relevant to RFI. There's still dynamic variable evaluation for every GPC parameter without whitelisting of variable names, so who knows if other vulnerabilities are present. - Steve
文章代碼(AID): #15-mCr00 (Bugtraq)
文章代碼(AID): #15-mCr00 (Bugtraq)