发布时间 :2000-05-22 00:00:00
修订时间 :2008-09-10 15:04:40

[原文]Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files.

[CNNVD]Cobalt RaQ2和RaQ3访问控制漏洞(CNNVD-200005-080)

        Cobalt RaQ2和RaQ3无法正确设置借助FrontPage上传的文件的访问权和所有权。攻击者利用此漏洞可以绕过cgiwrap并修改文件。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/h:sun:cobalt_raq_3iSun Cobalt RaQ 3.0
cpe:/h:sun:cobalt_raq_2Sun Cobalt RaQ 2.0

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20000522 Problem with FrontPage on Cobalt RaQ2/RaQ3

- 漏洞信息

Cobalt RaQ2和RaQ3访问控制漏洞
高危 未知
2000-05-22 00:00:00 2006-08-28 00:00:00
        Cobalt RaQ2和RaQ3无法正确设置借助FrontPage上传的文件的访问权和所有权。攻击者利用此漏洞可以绕过cgiwrap并修改文件。

- 公告与补丁


- 漏洞信息

Cobalt RaQ cgiwrap User Bypass
Remote / Network Access Authentication Management
Loss of Integrity
Exploit Public

- 漏洞描述

Cobalt RaQ contain a flaw that allows a malicious user to bypass restrictions imposed by .htaccess files. The flaw is due to RaQ servers assigning ownership of uploaded files to "httpd" instead of specific users. RaQ servers use 'cgiwrap' to ensure scripts are run as the user instead of httpd, but this can bypassed by creating a specially crafted .htaccess file containing parameters that will run the scripts under the 'httpd' user privileges.

- 时间线

2000-05-23 Unknow
2000-05-23 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Cobalt Networks has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete