找回密码
 注册
搜索
热搜: 回贴
  • 前程无忧官网首页 有什么好的平台可以
  • 最新的销售平台 互联网营销的平台有哪
  • 制作网页的基本流程 网页制作和网页设
  • 【帝国CMS】输出带序号的列表(数字排
  • 网站建设公司 三一,中联,极东泵车的
  • 织梦 建站 织梦网站模版后台怎么更改
  • 云服务官网 哪些网站有免费的简历模板
  • 如何建网站要什么条件 建网站要用什么
  • 吉林市移动公司电话 吉林省退休人员网
  • 设计类毕业论文 网站设计与实现毕业论
查看: 9546|回复: 4

PHP iCalendar上传文件绕过安全执行任意命令漏洞

[复制链接]
发表于 2009-11-23 00:11:20 | 显示全部楼层 |阅读模式 IP:江苏扬州
PHP iCalendar File Upload Security Bypass and Code Execution Vulnerabilities
Technical Description
Two vulnerabilities have been identified in PHP iCalendar, which may be exploited by remote attackers to execute arbitrary commands.
The first flaw is due to input validation errors when processing the "cookie_language" and "cookie_style" parameters, which could be exploited by attackers to include local files.
The second issue is due to an input validation error in the "publish.ical.php" script that does not properly validate the "X-WR-CALNAME" parameter, which could be exploited by attackers to upload arbitrary files and execute arbitrary commands in combination with the first issue.
Affected Products
PHP iCalendar version 2.21 and prior
Solution
The FrSIRT is not aware of any official supplied patch for this issue.
References
http://www.frsirt.com/english/advisories/2006/1019
Credits
Vulnerabilities reported by rgod
发表于 2009-11-26 16:05:01 | 显示全部楼层 IP:印度尼西亚
前一段又听说情缘软件公司的采集器出来了,估计在这儿做测试呢。
回复

使用道具 举报

发表于 2009-12-5 13:05:08 | 显示全部楼层 IP:北京
美丽让男人停下,智慧让男人留下。
回复

使用道具 举报

发表于 2009-12-6 22:05:03 | 显示全部楼层 IP:澳大利亚
我来自火星刚到地球什么都不懂
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 注册

本版积分规则

QQ|小黑屋|最新主题|手机版|微赢网络技术论坛 ( 苏ICP备08020429号 )

GMT+8, 2024-9-29 17:35 , Processed in 0.264558 second(s), 13 queries , Gzip On, MemCache On.

Powered by Discuz! X3.5

© 2001-2023 Discuz! Team.

快速回复 返回顶部 返回列表