CVE-2002-0599
CVSS10.0
发布时间 :2002-06-18 00:00:00
修订时间 :2008-09-05 16:28:27
NMCOE    

[原文]Blahz-DNS 0.2 and earlier allows remote attackers to bypass authentication and modify configuration by directly requesting CGI programs such as dostuff.php instead of going through the login screen.


[CNNVD]Blahz-DNS直接脚本调用验证可绕过漏洞(CNNVD-200206-039)

        
        Blahz-DNS是一款基于WEB的DNS信息管理工具,由PHP语言实现,可使用在Linux操作系统下。
        Blahz-DNS验证处理中存在漏洞,可导致远程攻击者绕过验证机制以管理员权限访问系统。
        Blahz-DNS只对登录页面实现验证处理,需要用户提供用户名和密码,攻击者可以通过直接调用Blahz-DNS中的其他脚本,就能绕过验证检查,无需密码以管理员权限全局访问Blahz-DNS所有功能如增加用户,改变用户等。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0599
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0599
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200206-039
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4618
(VENDOR_ADVISORY)  BID  4618
http://www.iss.net/security_center/static/8951.php
(VENDOR_ADVISORY)  XF  blahzdns-auth-bypass(8951)
http://archives.neohapsis.com/archives/bugtraq/2002-04/0395.html
(VENDOR_ADVISORY)  BUGTRAQ  20020428 Blahz-DNS: Authentication bypass vulnerability
http://sourceforge.net/project/shownotes.php?release_id=87004
(UNKNOWN)  CONFIRM  http://sourceforge.net/project/shownotes.php?release_id=87004
http://www.osvdb.org/5178
(UNKNOWN)  OSVDB  5178

- 漏洞信息

Blahz-DNS直接脚本调用验证可绕过漏洞
危急 未知
2002-06-18 00:00:00 2005-05-02 00:00:00
远程  
        
        Blahz-DNS是一款基于WEB的DNS信息管理工具,由PHP语言实现,可使用在Linux操作系统下。
        Blahz-DNS验证处理中存在漏洞,可导致远程攻击者绕过验证机制以管理员权限访问系统。
        Blahz-DNS只对登录页面实现验证处理,需要用户提供用户名和密码,攻击者可以通过直接调用Blahz-DNS中的其他脚本,就能绕过验证检查,无需密码以管理员权限全局访问Blahz-DNS所有功能如增加用户,改变用户等。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 使用访问控制限制用户访问Blahz-DNS程序。
        厂商补丁:
        Blahz-DNS
        ---------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Blahz-DNS Blahz-DNS 0.2:
        Blahz-DNS Upgrade blahzdns-0.25.tar.gz
        
        http://prdownloads.sourceforge.net/blahzdns/blahzdns-0.25.tar.gz

- 漏洞信息 (21426)

Blahz-DNS 0.2 Direct Script Call Authentication Bypass Vulnerability (EDBID:21426)
php webapps
2002-04-28 Verified
0 ppp-design
N/A [点击下载]
source: http://www.securityfocus.com/bid/4618/info

Blahz-DNS is a web based management tool for DNS information. It is implemented in PHP, and available for Linux systems.

By directly calling scripts included with Blahz-DNS, it is possible to bypass the authentication check, gaining full access to the Blahz-DNS tool.

http://www.example.com/dostuff.php?action=modify_user 		

- 漏洞信息

5178
Blahz-DNS dostuff.php Authentication Bypass
Remote / Network Access Authentication Management
Loss of Confidentiality, Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

Blahz-DNZ prior to 0.25 contains a flaw that may allow a malicious user to bypass authentication. The issue is triggered when a user bypasses the login page and accesses the application scripts directly. It is possible the flaw may allow improper access to the application, and a loss of integrity in the DNS records the application administers.

- 时间线

2002-04-28 Unknow
2002-04-28 Unknow

- 解决方案

Upgrade to version 0.25 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): password protect the application using .htaccess or similar.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站