CVE-2002-0489
CVSS10.0
发布时间 :2002-08-12 00:00:00
修订时间 :2016-10-17 22:20:29
NMCOS    

[原文]Linux Directory Penguin NsLookup CGI script (nslookup.pl) 1.0 allows remote attackers to execute arbitrary code via shell metacharacters in the (1) query or (2) type parameters.


[CNNVD]Linux Directory Penguin nslookup远程命令执行漏洞(CNNVD-200208-031)

        
        Penguin nslookup.pl是一款由perl语言实现在WEB接口下提供域名搜索的程序,由Linux Directory开发和维护。
        Penguin nslookup.pl由于在执行traceroute程序时没有充分过滤输入,可导致攻击者以httpd权限执行任意命令。
        Penguin nslookup.pl没有对用户输入的内容进行充分过滤,攻击者可以输入元字符";"并再后面追加任意命令,可导致攻击者可以以httpd的权限执行任意命令。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0489
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0489
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200208-031
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=101684215209558&w=2
(UNKNOWN)  BUGTRAQ  20020322 Re: PHP script: Penguin Traceroute, Remote Command Execution
http://www.iss.net/security_center/static/8601.php
(VENDOR_ADVISORY)  XF  penguin-nslookup-command-execution(8601)
http://www.securityfocus.com/bid/4353
(VENDOR_ADVISORY)  BID  4353

- 漏洞信息

Linux Directory Penguin nslookup远程命令执行漏洞
危急 输入验证
2002-08-12 00:00:00 2005-10-20 00:00:00
远程  
        
        Penguin nslookup.pl是一款由perl语言实现在WEB接口下提供域名搜索的程序,由Linux Directory开发和维护。
        Penguin nslookup.pl由于在执行traceroute程序时没有充分过滤输入,可导致攻击者以httpd权限执行任意命令。
        Penguin nslookup.pl没有对用户输入的内容进行充分过滤,攻击者可以输入元字符";"并再后面追加任意命令,可导致攻击者可以以httpd的权限执行任意命令。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 使用如下代码过滤元字符:
        "$host =~ s/[;<>\*\|'&\$!?#\(\)\[\]\{\}:'"\\]//g;"
        "$host = $q->param('host');"
        厂商补丁:
        Linux Directory
        ---------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.linux-directory.com/scripts/traceroute.shtml

- 漏洞信息

10431
Linux Directory Penguin nslookup.pl Shell Metacharacter Arbitrary Command Execution

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-03-22 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Linux Directory Penguin NSLookup Perl Script Arbitrary File Reading Vulnerability
Input Validation Error 4353
Yes No
2002-03-23 12:00:00 2009-07-11 11:56:00
Vulnerability discovery credited to <bugtraq@planet.nl>.

- 受影响的程序版本

Linux Directory Penguin nslookup 1.0
- Apache Software Foundation Apache 1.3.23
- Apache Software Foundation Apache 1.3.22
- Apache Software Foundation Apache 1.3.20
- Apache Software Foundation Apache 1.3.19

- 漏洞讨论

Penguin nslookup.pl is a freely available, open source script for tracing network hops from a web server. It is distributed by Linux Directory.

The Penguin nslookup script does not adequately filter special characters. This makes it possible for a remote user to access specific files on the local system. The attacker may read files that are accessible by the web server. Additionally, the attacker may be able to execute arbitrary commands with the permissions of the web server by encapsulating commands in special characters.

- 漏洞利用

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Currently the SecurityFocus staff are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站