CVE-1999-0455
CVSS7.5
发布时间 :1999-12-25 00:00:00
修订时间 :2008-09-09 08:34:36
NMCOES    

[原文]The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.


[CNNVD]Allaire ColdFusion远程文件的显示,删除,上传和执行漏洞(CNNVD-199912-084)

        ColdFusion中的表达式计算器示例应用程序存在漏洞,远程攻击者利用该漏洞通过exprcalc.cfm读取或删除服务器上的文件。exprcalc.cfm可以正确的无限制的访问服务器的。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0455
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0455
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199912-084
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/115
(VENDOR_ADVISORY)  BID  115

- 漏洞信息

Allaire ColdFusion远程文件的显示,删除,上传和执行漏洞
高危 其他
1999-12-25 00:00:00 2005-10-20 00:00:00
远程※本地  
        ColdFusion中的表达式计算器示例应用程序存在漏洞,远程攻击者利用该漏洞通过exprcalc.cfm读取或删除服务器上的文件。exprcalc.cfm可以正确的无限制的访问服务器的。

- 公告与补丁

        Use one of the following solutions:
        1. Remove the documentation directory (CFDOCS) from the server (this will not affect functionality of the server).
        2. Install the ColdFusion Server 4.0.1 Update, available for download from the DevCenter:
        http://www.allaire.com/developer
        (Note the 4.0.1 Update requires ColdFusion Server 4.0.)
        3: For versions of ColdFusion prior to 4.0, Allaire has released a patch that requires requests for the .cfm files in question to originate from the local host in order to be processed.
        Allaire ColdFusion Server 2.0
        
        Allaire ColdFusion Server 3.0
        
        Allaire ColdFusion Server 3.0.1
        
        Allaire ColdFusion Server 3.1
        
        Allaire ColdFusion Server 3.1.1
        
        Allaire ColdFusion Server 3.1.2
        
        Allaire ColdFusion Server 4.0
        

- 漏洞信息 (19093)

Allaire ColdFusion Server <= 4.0 Remote File Display, Deletion, Upload and Execution Vulnerability (EDBID:19093)
multiple remote
1998-12-25 Verified
0 rain.forest.puppy
N/A [点击下载]
source: http://www.securityfocus.com/bid/115/info

To display and delete any file on the system use an URL of the following form:

http://www.victim.test/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=C:\the\target\file

To upload files to the sever first find out the location of the sample code on the server by uploading a dummy file by using http://www.victim.test/cfdocs/expeval/openfile.cfm. After uploading a dummy file it will be displayed for you. The URL will be for the form:

http://www.victim.test/cfdocs/expeval/ExprCalc.cfm?RequestTimeout=2000&OpenFilePath=C:\Inetpub\wwwroot\cfdocs\expeval\.\dummy.txt

Now replace the "dummy.txt" string by "ExprCalc.cfm" to delete that file. We can now upload and execute ColdFusion files in the server without them being deleted.

http://www.exploit-db.com/sploits/19093.cfm		

- 漏洞信息

1
ColdFusion Application Server exprcalc.cfm OpenFilePath Parameter Arbitrary File Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality Workaround, Patch / RCS, Upgrade
Exploit Public Vendor Verified

- 漏洞描述

ColdFusion contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when an attacker specifies the OpenFilePath variable in the Expression Evaluator. This allows an attacker to view the contents of arbitrary files on the server and may result in a loss of confidentiality.

- 时间线

1998-12-25 Unknow
1998-12-25 1999-02-04

- 解决方案

Upgrade to version 4.0.1 or higher, as it has been reported to fix this vulnerability. Additionally, the vendor has released a patch for Windows NT and Solaris installation to address this issue, or users may opt to apply the following workaround: remove all sample code from the server.

- 相关参考

- 漏洞作者

- 漏洞信息

Allaire ColdFusion Remote File Display, Deletion, Upload and Execution Vulnerability
Origin Validation Error 115
Yes Yes
1998-12-25 12:00:00 2009-07-11 12:16:00
rain.forest.puppy <rfpuppy@iname.com> made public the ability to display and delete any file on the system in Phrack Issue 54 Article 8. kklinsky@themerge.com made public the ability to upload and execute arbitrary ColdFusion files in a L0pht advisory. Ad

- 受影响的程序版本

Allaire ColdFusion Server 4.0
Allaire ColdFusion Server 3.1.2
Allaire ColdFusion Server 3.1.1
Allaire ColdFusion Server 3.1
Allaire ColdFusion Server 3.0.1
Allaire ColdFusion Server 3.0
Allaire ColdFusion Server 2.0
Allaire ColdFusion Server 4.0.1

- 不受影响的程序版本

Allaire ColdFusion Server 4.0.1

- 漏洞讨论

A security vulnerability allows remote web users to delete and display any file in the system, as well as possibly allow the upload and execution of ColdFusion files.

A default installation of Cold Fusion Server includes sample code and documentation that is available to web browsing users. One of these sample applications, the expression evaluator, allows users to experiment with ColdFusion expressions. It gives you the option to upload a file, which it will the process and display and subsequently delete. Normally access to the application is restricted to the local machine. However, some pages in the application can be acessed directly. By passing it a handcrafted URL you can order it to display and delete any file on the system.

The expression calculator is composed of several files. openfile.cfm and openedfile.cfm allows you to upload a file to the sever. exprcalc.cfm processes the uploaded file, displays it and then deletes it.

By using exprcacl.cfm to delete itself we can upload a file to the server that will not be deleted which we can then try to execute.

- 漏洞利用

To display and delete any file on the system use an URL of the following form:

http://www.victim.test/cfdocs/expeval/ExprCalc.cfm?OpenFilePath=C:\the\target\file

To upload files to the sever first find out the location of the sample code on the server by uploading a dummy file by using http://www.victim.test/cfdocs/expeval/openfile.cfm. After uploading a dummy file it will be displayed for you. The URL will be for the form:

http://www.victim.test/cfdocs/expeval/ExprCalc.cfm?RequestTimeout=2000&amp;OpenFilePath=C:\Inetpub\wwwroot\cfdocs\expeval\.\dummy.txt

Now replace the "dummy.txt" string by "ExprCalc.cfm" to delete that file. We can now upload and execute ColdFusion files in the server without them being deleted.

- 解决方案

Use one of the following solutions:

1. Remove the documentation directory (CFDOCS) from the server (this will not affect functionality of the server).

2. Install the ColdFusion Server 4.0.1 Update, available for download from the DevCenter:
http://www.allaire.com/developer
(Note the 4.0.1 Update requires ColdFusion Server 4.0.)

3: For versions of ColdFusion prior to 4.0, Allaire has released a patch that requires requests for the .cfm files in question to originate from the local host in order to be processed.


Allaire ColdFusion Server 2.0

Allaire ColdFusion Server 3.0

Allaire ColdFusion Server 3.0.1

Allaire ColdFusion Server 3.1

Allaire ColdFusion Server 3.1.1

Allaire ColdFusion Server 3.1.2

Allaire ColdFusion Server 4.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站