CVE-2000-0435
CVSS7.5
发布时间 :2000-05-13 00:00:00
修订时间 :2008-09-10 15:04:40
NMCOS    

[原文]The allmanageup.pl file upload CGI script in the Allmanage Website administration software 2.6 can be called directly by remote attackers, which allows them to modify user accounts or web pages.


[CNNVD]Allmanage管理员密码检索漏洞(CNNVD-200005-051)

        allmanageup.pl文件上传Allmanage Website administration software 2.6 的CGI脚本存在漏洞,远程攻击者可以直接调用来修改用户账号和web页面。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-0435
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-0435
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200005-051
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/1217
(UNKNOWN)  BID  1217
http://www.osvdb.org/1337
(UNKNOWN)  OSVDB  1337
http://archives.neohapsis.com/archives/bugtraq/2000-05/0167.html
(UNKNOWN)  BUGTRAQ  20000516 Allmanage.pl Vulnerabilities

- 漏洞信息

Allmanage管理员密码检索漏洞
高危 配置错误
2000-05-13 00:00:00 2005-05-02 00:00:00
远程  
        allmanageup.pl文件上传Allmanage Website administration software 2.6 的CGI脚本存在漏洞,远程攻击者可以直接调用来修改用户账号和web页面。

- 公告与补丁

        Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.
        This problem can be circumvented by setting permissions on the file ../k in the Allmanage directory to refuse remote reading.

- 漏洞信息

1337
Allmanage allmanageup.pl Arbitrary File and User Account Modification
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Allmanage contains a flaw that may allow a remote attacker to arbitrary modify files and user accounts. The issue is triggered when requesting the 'allmanageup.pl' script directly. It is possible that the flaw may allow a remote attacker to arbitrary add, change and delete user accounts and/or modify the contents of the directory main page resulting in a loss of integrity.

- 时间线

2000-05-13 2001-01-01
2000-05-13 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It may be possible to correct the flaw by implementing the following workaround: Remove the read file permission on the allmanage/k file for all users except the owner of the file.

- 相关参考

- 漏洞作者

- 漏洞信息

Allmanage Administrator Password Retrieval Vulnerability
Configuration Error 1217
Yes No
2000-05-13 12:00:00 2009-07-11 01:56:00
Posted to bugtraq on May 13, 2000 by bighawk <bighawk@warfare.com>

- 受影响的程序版本

Matthew Redman Allmanage 2.6

- 漏洞讨论

Allmanage is a free suite of perl scripts which allows numerous web sites to be maintained on a server under separate accounts. It stores the administrator's password in a file called "k" which resides in the same directory on the server as the scripts (allmanage.pl, allmanage_admin.pl, and a number of others). If the remote intruder has permissions to read the file "k", he can then load allmanage_admin.pl and enter the management console with administrator priviledges. Some of the features of this console include user account management, file manipulation, quotas, etc.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

This problem can be circumvented by setting permissions on the file ../k in the Allmanage directory to refuse remote reading.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站