CVE-2002-0893
CVSS5.0
发布时间 :2002-10-04 00:00:00
修订时间 :2008-09-05 16:29:14
NMCOES    

[原文]Directory traversal vulnerability in NewAtlanta ServletExec ISAPI 4.1 allows remote attackers to read arbitrary files via a URL-encoded request to com.newatlanta.servletexec.JSP10Servlet containing "..%5c" (modified dot-dot) sequences.


[CNNVD]NewAtlanta ServletExec/ISAPI远程文件泄露漏洞(CNNVD-200210-171)

        
        ServletExec/ISAPI是一款运行在Microsoft IIS WEB平台下的Java Servlet/JSP引擎插件,可使用在Microsoft Windows NT/2000/XP系统下的IIS WEB服务程序中。
        ServletExec/ISAPI对用户提交的特殊URL请求处理不够正确,可导致远程攻击者访问Web主目录中任意文件的内容。
        ServletExec/ISAPI对unicode编码处理不正确,攻击者可以提交包含unicode字符的特殊URL请求,以Web进程的权限查看Web主目录中任意文件内容,导致敏感信息泄露,攻击者可以利用此漏洞得到的信息进一步对系统进行攻击。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0893
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0893
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-171
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4795
(VENDOR_ADVISORY)  BID  4795
http://www.iss.net/security_center/static/9140.php
(VENDOR_ADVISORY)  XF  servletexec-dotdot-directory-traversal(9140)
http://online.securityfocus.com/archive/1/273615
(UNKNOWN)  BUGTRAQ  20020522 Multiple vulnerabilities in NewAtlanta ServletExec ISAPI 4.1
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0077.html
(UNKNOWN)  VULNWATCH  20020522 [VulnWatch] Multiple vulnerabilities in NewAtlanta ServletExec ISAPI 4.1

- 漏洞信息

NewAtlanta ServletExec/ISAPI远程文件泄露漏洞
中危 输入验证
2002-10-04 00:00:00 2005-10-20 00:00:00
远程  
        
        ServletExec/ISAPI是一款运行在Microsoft IIS WEB平台下的Java Servlet/JSP引擎插件,可使用在Microsoft Windows NT/2000/XP系统下的IIS WEB服务程序中。
        ServletExec/ISAPI对用户提交的特殊URL请求处理不够正确,可导致远程攻击者访问Web主目录中任意文件的内容。
        ServletExec/ISAPI对unicode编码处理不正确,攻击者可以提交包含unicode字符的特殊URL请求,以Web进程的权限查看Web主目录中任意文件内容,导致敏感信息泄露,攻击者可以利用此漏洞得到的信息进一步对系统进行攻击。
        

- 公告与补丁

        厂商补丁:
        NewAtlanta
        ----------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        NewAtlanta Patch ServletExec_4_1p9.zip
        ftp://ftp.newatlanta.com/public/4_1/patches/

- 漏洞信息 (21470)

NewAtlanta ServletExec/ISAPI 4.1 File Disclosure Vulnerability (EDBID:21470)
windows remote
2002-05-22 Verified
0 Matt Moore
N/A [点击下载]
source: http://www.securityfocus.com/bid/4795/info

ServletExec/ISAPI is a plug-in Java Servlet/JSP engine for Microsoft IIS. It runs with IIS on Microsoft Windows NT/2000/XP systems.

ServletExec/ISAPI will disclose the contents of arbitrary files within the webroot directory by sending a request containing URL encoded directory traversal sequences. While this will cause the software to serve files within wwwroot that normally would not be served, it does not appear possible to exploit this condition to break out of the webroot.

http://target/servlet/com.newatlanta.servletexec.JSP10Servlet/..%5c..%5c\global.asa 		

- 漏洞信息

783
ServletExec ISAPI com.newatlanta.servletexec.JSP10Servlet Traversal Arbitrary File Access
Input Manipulation

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-05-22 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

NewAtlanta ServletExec/ISAPI File Disclosure Vulnerability
Input Validation Error 4795
Yes No
2002-05-22 12:00:00 2009-07-11 12:46:00
Discovery of this issue is credited to Matt Moore <matt@Westpoint.ltd.uk>.

- 受影响的程序版本

NewAtlanta ServletExec/ISAPI 4.1
- Microsoft IIS 5.1
- Microsoft IIS 5.0
- Microsoft IIS 4.0

- 漏洞讨论

ServletExec/ISAPI is a plug-in Java Servlet/JSP engine for Microsoft IIS. It runs with IIS on Microsoft Windows NT/2000/XP systems.

ServletExec/ISAPI will disclose the contents of arbitrary files within the webroot directory by sending a request containing URL encoded directory traversal sequences. While this will cause the software to serve files within wwwroot that normally would not be served, it does not appear possible to exploit this condition to break out of the webroot.

- 漏洞利用

This issue may be exploited with a web browser. The following example may be used to disclose the contents of 'global.asa', which is ordinarily restricted from being served by the software:

http://target/servlet/com.newatlanta.servletexec.JSP10Servlet/..%5c..%5c\global.asa

- 解决方案

The vendor has released a fix which addresses this issue.


NewAtlanta ServletExec/ISAPI 4.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站