CVE-2001-1334
CVSS5.0
发布时间 :2002-05-19 00:00:00
修订时间 :2016-10-17 22:14:32
NMCOE    

[原文]Block_render_url.class in PHPSlash 0.6.1 allows remote attackers with PHPSlash administrator privileges to read arbitrary files by creating a block and specifying the target file as the source URL.


[CNNVD]PHPSlash URL块任意文件泄露漏洞(CNNVD-200205-048)

        PHPSlash 0.6.1版本的Block_render_url.class存在漏洞。有PHPSlash管理员特权的远程攻击者通过创建空心块和指定目标文件为源URL读取任意文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:phpslash:phpslash:0.6.1
cpe:/a:phpslash:phpslash:0.5.3.2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1334
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2001-1334
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200205-048
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/bugtraq/2001-05/0126.html
(UNKNOWN)  BUGTRAQ  20010515 PHPSlash : potential vulnerability in URL blocks
http://marc.info/?l=phpslash&m=99029398904419&w=2
(UNKNOWN)  CONFIRM  http://marc.info/?l=phpslash&m=99029398904419&w=2
http://www.iss.net/security_center/static/9990.php
(UNKNOWN)  XF  phpslash-block-read-files(9990)
http://www.securityfocus.com/bid/2724
(UNKNOWN)  BID  2724

- 漏洞信息

PHPSlash URL块任意文件泄露漏洞
中危 输入验证
2002-05-19 00:00:00 2005-05-02 00:00:00
本地  
        PHPSlash 0.6.1版本的Block_render_url.class存在漏洞。有PHPSlash管理员特权的远程攻击者通过创建空心块和指定目标文件为源URL读取任意文件。

- 公告与补丁

        The vendor has addressed the problem and a patch submitted by tobozo tagada is available for download.

- 漏洞信息 (20848)

PHPSlash 0.5.3 2/0.6.1 URL Block Arbitrary File Disclosure Vulnerability (EDBID:20848)
php webapps
2001-04-15 Verified
0 tobozo tagada
N/A [点击下载]
source: http://www.securityfocus.com/bid/2724/info

PHPSlash is a widely used open source Groupware utility.

PHPSlash contains a vulnerability which may disclose files readable to the webserver process on the underlying host to PHPSlash users who can 'edit' URL blocks.

Exploitation may result in attackers gaining local access to the webserver or information which could assist in further attacks. 

Login as admin with GOD permissions
Access the BLOCKS admin section
(blockAdmin.php3) and
create a new block with the following information :

Title : notTrusted
Type : url
Site Location : whatever
Source URL : ./config.php3
Expire Length : 0
Owned by section : home
Data : (empty)
Order number : whatever

It will display the content of the config.php3 as text in
the block of the main page.

It might become an issue if blockAdmin.php3 gives
add/edit/remove permission to some users that are
not
supposed to access the filesystem. 		

- 漏洞信息

5430
phpSlash block_render_url.class Arbitrary File Access
Remote / Network Access Information Disclosure
Loss of Confidentiality Upgrade
Exploit Public Third-party Verified

- 漏洞描述

- 时间线

2004-04-08 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 065 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站