php-5.2.9.2,[PHP]PHP小于5.2.9版本号的Windows版本存在本地漏洞

已经证实在小于5.2.9版本号的Windows版PHP中,存在一个安全模式下的本地旁路漏洞。

这个漏洞是因为Windows系统和Linux/UNIX系统对待目录的不同造成的(\和/的区别)。

原文内容:

Abysssec Inc Public Advisory

Title : PHP <= 5.2.9 SafeMod Bypass Vulnerability

Affected Version : Tested on 5.2.8, 5.2.6 but previous versions maybe be afftect

Vendor Site :

Vulnerability Discoverd by :

Description :

Here is another safemod bypass vulnerability exist in php <= 5.2.9 on windows .

the problem comes from OS behavior - implement and interfacing between php

and operation systems directory structure . the problem is php won't tell difference

between directory browsing in linux and windows this can lead attacker to ability

execute his / her commands on targert machie even in SafeMod On (php.ini setting) .

Vulnerability :

in linux when you want open a directory for example php directory you need

to go to /usr/bin/php and you can't use \usr\bin\php . but windows won't tell

diffence between slash and back slash it means there is no didffrence between

c:\php and c:/php , and this is not vulnerability but itself but because of this simple

php implement "\" character can escape safemode using function like excec .

PoC / Exploit :

orginal : /safemod-windows.zip

mirror :

note : this vulnerabities is just for educational purpose and showing vulnerability exist

so author will be not be responsible for any damage using this vulnerabilty.

for more information visit Abysssec.com

feel free to contact me at admin [at] abysssec.com

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值