Chinaunix首页 | 论坛 | 博客
  • 博客访问: 519961
  • 博文数量: 99
  • 博客积分: 6010
  • 博客等级: 准将
  • 技术积分: 1110
  • 用 户 组: 普通用户
  • 注册时间: 2008-10-01 09:01
文章分类

全部博文(99)

文章存档

2010年(4)

2009年(86)

2008年(9)

我的朋友

分类: WINDOWS

2009-05-27 08:34:11

已经证实在小于5.2.9版本号的Windows版PHP中,存在一个安全模式下的本地旁路漏洞。

这个漏洞是因为Windows系统和Linux/UNIX系统对待目录的不同造成的(\和/的区别)。

原文内容:
Abysssec Inc Public Advisory


Title : PHP <= 5.2.9 SafeMod Bypass Vulnerability
Affected Version : Tested on 5.2.8, 5.2.6 but previous versions maybe be afftect
Vendor Site :

Vulnerability Discoverd by :


Description :

Here is another safemod bypass vulnerability exist in php <= 5.2.9 on windows .
the problem comes from OS behavior - implement and interfacing between php
and operation systems directory structure . the problem is php won't tell difference
between directory browsing in linux and windows this can lead attacker to ability
execute his / her commands on targert machie even in SafeMod On (php.ini setting) .

Vulnerability :

in linux when you want open a directory for example php directory you need
to go to /usr/bin/php and you can't use \usr\bin\php . but windows won't tell
diffence between slash and back slash it means there is no didffrence between
c:\php and c:/php , and this is not vulnerability but itself but because of this simple
php implement "\" character can escape safemode using function like excec .


PoC / Exploit :

orginal : /safemod-windows.zip
mirror :



note : this vulnerabities is just for educational purpose and showing vulnerability exist
so author will be not be responsible for any damage using this vulnerabilty.

for more information visit Abysssec.com
feel free to contact me at admin [at] abysssec.com

阅读(1618) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~