CVE-2001-0389
CVSS5.0
发布时间 :2001-07-02 00:00:00
修订时间 :2008-09-05 16:23:59
NMCOS    

[原文]IBM Websphere/NetCommerce3 3.1.2 allows remote attackers to determine the real path of the server by directly calling the macro.d2w macro with a NOEXISTINGHTMLBLOCK argument.


[CNNVD]IBM Websphere/Net.Commerce泄漏安装目录的漏洞(CNNVD-200107-012)

        CVE(CAN) ID: CAN-2001-0389
        
        
        
        Net.Commerce是IBM发行的产品的Websphere平台的一部分。它提供了一些通用的特性使电子
        
        商务变得更加容易,其性能和可靠性也有独到之处。
        
        
        
        Net.Commerce包中存在的一个问题使得远程攻击者可以发现Websphere的安装路径。通过直接
        
        引用文件macro.d2w并跟以NOEXISTINGHTMLBLOCK的后缀,可使Webshpere返回Net.Commerce
        
        软件的安装路径。
        
        
        
        这使得远程用户可以搜集Web框架的布局,有助于入侵系统。
        
        
        
        <* 来源:ET LoWNOISE (et@cyberspace.org) *>
        
        
        
        
        
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:ibm:websphere_application_server:5.1.0.3IBM WebSphere Application Server 5.1.0.3
cpe:/a:ibm:net.commerce:3.1.2IBM Net.Commerce 3.1.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0389
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-0389
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200107-012
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/2587
(VENDOR_ADVISORY)  BID  2587
http://www.securityfocus.com/archive/1/176100
(UNKNOWN)  BUGTRAQ  20010413 [LoWNOISE] IBM Websphere/NetCommerce3 DoS and one more.

- 漏洞信息

IBM Websphere/Net.Commerce泄漏安装目录的漏洞
中危 设计错误
2001-07-02 00:00:00 2006-08-21 00:00:00
远程  
        CVE(CAN) ID: CAN-2001-0389
        
        
        
        Net.Commerce是IBM发行的产品的Websphere平台的一部分。它提供了一些通用的特性使电子
        
        商务变得更加容易,其性能和可靠性也有独到之处。
        
        
        
        Net.Commerce包中存在的一个问题使得远程攻击者可以发现Websphere的安装路径。通过直接
        
        引用文件macro.d2w并跟以NOEXISTINGHTMLBLOCK的后缀,可使Webshpere返回Net.Commerce
        
        软件的安装路径。
        
        
        
        这使得远程用户可以搜集Web框架的布局,有助于入侵系统。
        
        
        
        <* 来源:ET LoWNOISE (et@cyberspace.org) *>
        
        
        
        
        
        

- 公告与补丁

        
        
        厂商补丁:
        
        
        
        暂无
        
        
        

- 漏洞信息

9676
IBM WebSphere/NetCommerce3 macro.d2w Macro Path Disclosure

- 漏洞描述

Unknown or Incomplete

- 时间线

2001-04-13 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

IBM Websphere/Net.Commerce Installation Directory Revealing Vulnerability
Design Error 2587
Yes No
2001-04-13 12:00:00 2009-07-11 06:06:00
This vulnerability was announced to Bugtraq by ET LoWNOISE <et@cyberspace.org> on April 13, 2001.

- 受影响的程序版本

IBM Net.Commerce 3.1.2
- IBM AIX 4.3.2
- IBM AIX 4.3.1
- IBM AIX 4.2.1
- Microsoft Windows NT 4.0
- Sun Solaris 7.0
- Sun Solaris 2.6

- 漏洞讨论

Net.Commerce is part of the Websphere platform of products distributed by IBM. Net.Commerce provides several versatile features to facilitate e-commerce, and features in performance and reliability.

A problem with the Net.Commerce package could allow a remote user to discover the path of the Websphere installation. By directly referencing the macro.d2w file with an extension of NOEXISTINGHTMLBLOCK, Websphere returns the path of the Net.Commerce software installation.

This makes it possible for a remote user to gather information about the layout of a web infrastructure, which may aid in compromise of the system.

- 漏洞利用

http://host/cgi-bin/ncommerce3/ExecMacro/macro.d2w/NOEXISTINGHTMLBLOCK

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站