CVE-2001-0308
CVSS7.5
发布时间 :2001-05-03 00:00:00
修订时间 :2008-09-05 16:23:47
NMCOES    

[原文]UploadServlet in Bajie HTTP JServer 0.78, and possibly other versions before 0.80, allows remote attackers to execute arbitrary commands by calling the servlet to upload a program, then using a ... (modified ..) to access the file that was created for the program.


[CNNVD]Bajie Webserver远程命令执行漏洞(CNNVD-200105-034)

        
        Bajie Http JServer是一个用Java写的Web服务器,可以从 http://go.to/bajie 和 http://java.tucows.com 这两个站点获得。
        Bajie Http JServer存在漏洞,有可能在运行Bajie Webserver的主机上远程执行任意的命令。
        远程用户可以利用Bajie内置的上传特性把恶意脚本放在Bajie Webserver上。可以把这些上传脚本取名为已知的文件名,并且放在已知的目录位置上。一旦这些文件被上传,它们就可以作为CGI 脚本在服务器上执行。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-94 [对生成代码的控制不恰当(代码注入)]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0308
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0308
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200105-034
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/2388
(VENDOR_ADVISORY)  BID  2388
http://www.geocities.com/gzhangx/websrv/docs/security.html
(UNKNOWN)  CONFIRM  http://www.geocities.com/gzhangx/websrv/docs/security.html
http://archives.neohapsis.com/archives/bugtraq/2001-02/0314.html
(VENDOR_ADVISORY)  BUGTRAQ  20010216 Vulnerabilities in Bajie Http JServer

- 漏洞信息

Bajie Webserver远程命令执行漏洞
高危 输入验证
2001-05-03 00:00:00 2005-10-20 00:00:00
远程※本地  
        
        Bajie Http JServer是一个用Java写的Web服务器,可以从 http://go.to/bajie 和 http://java.tucows.com 这两个站点获得。
        Bajie Http JServer存在漏洞,有可能在运行Bajie Webserver的主机上远程执行任意的命令。
        远程用户可以利用Bajie内置的上传特性把恶意脚本放在Bajie Webserver上。可以把这些上传脚本取名为已知的文件名,并且放在已知的目录位置上。一旦这些文件被上传,它们就可以作为CGI 脚本在服务器上执行。
        

- 公告与补丁

        厂商补丁:
        Bajie
        -----
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Bajie Java HTTP Server 0.78:
        Bajie Upgrade httpsrv
        
        http://www.geocities.com/gzhangx/websrv/httpsrv.zip

- 漏洞信息 (20638)

Bajie Webserver 0.78/0.90 Remote Command Execution Vulnerability (EDBID:20638)
multiple remote
2001-02-15 Verified
0 joetesta
N/A [点击下载]
source: http://www.securityfocus.com/bid/2388/info

It is possible to execute arbitrary commands on a host running Bajie Webserver.

A remote user can use Bajie's built-in upload feature to place malicious scripts on Bajie webservers. These uploaded scripts are placed in known destination directories and can be automatically executed. Unfortunately Bajie's CGI processor doesn't verify the CGI program exists before executing the script.

Once these files are uploaded, they can be then executed as CGI scripts on the server. 

Upload the malicious script via:

http://target/upload.html

Execute it via:

http://target/cgi/bin//...//upload/[file name] 		

- 漏洞信息

11638
Bajie HTTP JServer UploadServlet upload.html File Upload Arbitrary Program Execution
Remote / Network Access Other
Loss of Integrity
Exploit Public

- 漏洞描述

- 时间线

2001-02-16 Unknow
2001-02-16 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Bajie Webserver Remote Command Execution Vulnerability
Input Validation Error 2388
Yes Yes
2001-02-15 12:00:00 2009-07-11 04:46:00
Discovered by <joetesta@hushmail.com> and posted to Bugtraq on Feb 15, 2001.

- 受影响的程序版本

Bajie Java HTTP Server 0.90
Bajie Java HTTP Server 0.78 a
Bajie Java HTTP Server 0.78
Bajie Java HTTP Server 0.95 d
Bajie Java HTTP Server 0.95
Bajie Java HTTP Server 0.94 z
Bajie Java HTTP Server 0.94 u4
Bajie Java HTTP Server 0.94 r
Bajie Java HTTP Server 0.94 g6
Bajie Java HTTP Server 0.93
Bajie Java HTTP Server 0.92 g
Bajie Java HTTP Server 0.92

- 不受影响的程序版本

Bajie Java HTTP Server 0.95 d
Bajie Java HTTP Server 0.95
Bajie Java HTTP Server 0.94 z
Bajie Java HTTP Server 0.94 u4
Bajie Java HTTP Server 0.94 r
Bajie Java HTTP Server 0.94 g6
Bajie Java HTTP Server 0.93
Bajie Java HTTP Server 0.92 g
Bajie Java HTTP Server 0.92

- 漏洞讨论

It is possible to execute arbitrary commands on a host running Bajie Webserver.

A remote user can use Bajie's built-in upload feature to place malicious scripts on Bajie webservers. These uploaded scripts are placed in known destination directories and can be automatically executed. Unfortunately Bajie's CGI processor doesn't verify the CGI program exists before executing the script.

Once these files are uploaded, they can be then executed as CGI scripts on the server.

- 漏洞利用

The following example has been provided by &lt;joetesta@hushmail.com&gt;:

Upload the malicious script via:

http://target/upload.html

Execute it via:

http://target/cgi/bin//...//upload/[file name]

- 解决方案

This issue has been addressed in the latest release of Bajie:


Bajie Java HTTP Server 0.78

Bajie Java HTTP Server 0.78 a

Bajie Java HTTP Server 0.90

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站