phpBB 2.0.23 - From Variable...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

Case Study Variable Tampering Among others, RIPS reported a variable tampering issue in the style configuration page for administrators. The GET parameter install_to is used as the name of a variable. admin/admin_styles.php ``` $install_to = isset($HTTP_GET_VARS['install_to']) ? urldecode($HTTP_GET_VARS['install_to']) : $HTTP_POST_VARS['install_to']; ⋮ $template_name = ${$install_to}; ``` This issue enables an attacker to assign any variable to the $template_name variable. For example, the request admin_styles.php?install_to=rips will lead to the assignment $template_name = $rips;. Depending on the previously declared variables and the use of $template_name this can lead to other security vulnerabilities. RIPS automatically analyzes all possible combinations for exploitation and, as a result, reported a related SQL injection vulnerability. ### SQL Injection Now it gets interesting. The $template_name variable, which is in the attacker’s control, is used within two loops in order to...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息