发布时间 :2000-10-20 00:00:00
修订时间 :2008-09-10 15:05:39

[原文]ntop running in web mode allows remote attackers to read arbitrary files via a .. (dot dot) attack.


        Web模式的ntop存在漏洞。远程攻击者可以借助..(点 点)攻击读取任意文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20000802 [ Hackerslab bug_paper ] ntop web mode vulnerabliity

- 漏洞信息

中危 未知
2000-10-20 00:00:00 2005-08-17 00:00:00
        Web模式的ntop存在漏洞。远程攻击者可以借助..(点 点)攻击读取任意文件。

- 公告与补丁


- 漏洞信息 (20143)

Luca Deri ntop 1.2 a7-9 Unauthorized File Retrieval Vulnerability (EDBID:20143)
linux remote
2000-08-02 Verified
0 dubhe
N/A [点击下载]

ntop is a tool that shows the network usage, similar to what the popular top Unix command does. Starting ntop in web mode (with the -w parameter) starts ntop with it's own built in HTTP server, to allow remote access to the functions it provides. ntop does not properly authenticate requests and is vulnerable to a ../../ request whereby unauthorized files can be retrieved, including files which are only readable by root. 

The default directory ntop serves HTML from is /etc/ntop/html so to retrieve /etc/shadow one can request the following URL: http://URL:port/../../shadow 		

- 漏洞信息

ntop -w Arbitrary File Access
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality Upgrade
Exploit Public Third-party Verified

- 漏洞描述

ntop running in web mode (-w) contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the internal web server not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the URI.

- 时间线

2000-08-02 2000-08-02
2000-08-02 Unknow

- 解决方案

Upgrade to version 1.3.1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者