CVE-2002-0708
CVSS5.0
发布时间 :2002-10-10 00:00:00
修订时间 :2016-10-17 22:21:38
NMCOES    

[原文]Directory traversal vulnerability in the Web Reports Server for SurfControl SuperScout WebFilter allows remote attackers to read arbitrary files via an HTTP request containing ... (triple dot) sequences.


[CNNVD]SurfControl SuperScout WebFilter文件泄露漏洞(CNNVD-200210-243)

        SurfControl SuperScout WebFilter的Web Reports Server存在目录遍历漏洞。远程攻击者可以借助含…(三倍点)序列的HTTP请求读取任意文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:surfcontrol:superscout_web_filter:3.0.3
cpe:/a:surfcontrol:superscout_web_filter:3.0
cpe:/a:surfcontrol:web_filter:4.1
cpe:/a:surfcontrol:web_filter:4.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0708
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0708
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-243
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=103359690824103&w=2
(UNKNOWN)  BUGTRAQ  20021002 wp--02-0005: Multiple Vulnerabilities in SuperScout Web Reports Server
http://www.iss.net/security_center/static/10244.php
(UNKNOWN)  XF  superscout-webfilter-directory-traversal(10244)
http://www.securityfocus.com/bid/5857
(UNKNOWN)  BID  5857

- 漏洞信息

SurfControl SuperScout WebFilter文件泄露漏洞
中危 路径遍历
2002-10-10 00:00:00 2005-10-20 00:00:00
远程  
        SurfControl SuperScout WebFilter的Web Reports Server存在目录遍历漏洞。远程攻击者可以借助含…(三倍点)序列的HTTP请求读取任意文件。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息 (21897)

SurfControl SuperScout WebFilter for windows 2000 File Disclosure Vulnerability (EDBID:21897)
windows remote
2002-10-02 Verified
0 Matt Moore
N/A [点击下载]
source: http://www.securityfocus.com/bid/5857/info

SurfControl SuperScout WebFilter Reports Server is prone to a vulnerability which may allow remote attackers to disclose the contents of arbitrary files.

The Reports Server does not sufficiently filter triple-dot-slash (.../) sequences from web requests. As a result, an attacker may break out of the root directory for the reporting service and browse the filesystem at large, disclosing arbitrary files that are readable by the Reports Server.

http://reports-server:8888/.../.../.../.../.../.../.../winnt/win.ini		

- 漏洞信息

3493
SurfControl SuperScout Web Filter Arbitrary File Access

- 漏洞描述

SurfControl web filters contain a flaw that allow a remote attacker to retrieve any file on the server. The issue is due to a lack of sanity checking on URI requests. An attacker can use a class directory traversal style attack (../../) to request any arbitrary file on the web server.

- 时间线

2002-10-01 Unknow
2002-10-01 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workarounds: Disable the reports server and consider using a terminal session to the server to access the reports.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

SurfControl SuperScout WebFilter File Disclosure Vulnerability
Input Validation Error 5857
Yes No
2002-10-02 12:00:00 2009-07-11 05:06:00
Discovery of this issue is credited to Matt Moore <matt@westpoint.ltd.uk>.

- 受影响的程序版本

SurfControl Web Filter for Windows NT/2000 4.1
SurfControl Web Filter for Windows NT/2000 4.0
SurfControl SuperScout Web Filter for Windows NT/2000 3.0.3
SurfControl SuperScout Web Filter for Windows NT/2000 3.0

- 漏洞讨论

SurfControl SuperScout WebFilter Reports Server is prone to a vulnerability which may allow remote attackers to disclose the contents of arbitrary files.

The Reports Server does not sufficiently filter triple-dot-slash (.../) sequences from web requests. As a result, an attacker may break out of the root directory for the reporting service and browse the filesystem at large, disclosing arbitrary files that are readable by the Reports Server.

- 漏洞利用

The following example was submitted:

http://reports-server:8888/.../.../.../.../.../.../.../winnt/win.ini

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站