CVE-2002-0897
CVSS7.5
发布时间 :2002-10-04 00:00:00
修订时间 :2008-09-05 16:29:14
NMCOE    

[原文]LocalWEB2000 2.1.0 web server allows remote attackers to bypass access restrictions for restricted files via a URL that contains the "/./" directory.


[CNNVD]LocalWEB2000远程文件泄露漏洞(CNNVD-200210-193)

        
        LocalWEB2000是一款适合个人用户的Web服务器程序,可使用在Windows操作系统下。
        LocalWEB2000在文件保护机制实现中存在漏洞,可导致远程攻击者绕过保护访问文件内容。
        LocalWEB2000存在文件保护功能,不过由于设计错误,攻击者可以提交包含'./'并追加相应要查看文件名的URL来绕过文件保护功能,造成敏感信息泄露。
        此漏洞测试于LocalWEB2000 Standard Version 2.1.0,其他版本也可能存在此漏洞。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0897
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0897
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-193
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4820
(VENDOR_ADVISORY)  BID  4820
http://www.iss.net/security_center/static/9165.php
(VENDOR_ADVISORY)  XF  localweb2k-protection-bypass(9165)
http://online.securityfocus.com/archive/1/274020
(UNKNOWN)  BUGTRAQ  20020524 [SecurityOffice] LocalWeb2000 Web Server Protected File Access Vulnerability
http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0079.html
(UNKNOWN)  VULNWATCH  20020524 [SecurityOffice] LocalWeb2000 Web Server Protected File Access Vulnerability

- 漏洞信息

LocalWEB2000远程文件泄露漏洞
高危 未知
2002-10-04 00:00:00 2005-10-12 00:00:00
远程  
        
        LocalWEB2000是一款适合个人用户的Web服务器程序,可使用在Windows操作系统下。
        LocalWEB2000在文件保护机制实现中存在漏洞,可导致远程攻击者绕过保护访问文件内容。
        LocalWEB2000存在文件保护功能,不过由于设计错误,攻击者可以提交包含'./'并追加相应要查看文件名的URL来绕过文件保护功能,造成敏感信息泄露。
        此漏洞测试于LocalWEB2000 Standard Version 2.1.0,其他版本也可能存在此漏洞。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 对LocalWEB2000实行访问控制,只允许可信用户访问。
        厂商补丁:
        LocalWEB2000
        ------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.intranet-server.co.uk/index1.asp

- 漏洞信息 (21475)

LocalWEB2000 2.1 .0 Standard Version File Disclosure Vulnerability (EDBID:21475)
windows remote
2002-05-24 Verified
0 Tamer Sahin
N/A [点击下载]
source: http://www.securityfocus.com/bid/4820/info

A vulnerability exists in LocalWEB2000 related to content password protection. It is possible to have LocalWEB2000 treat files as unprotected by requesting them as files within the '.' (current) directory. If the file http://server/file.txt is set to be password protected, the protection will be bypassed if a request is made for http://server/./file.txt. This is likely due to a design error in the protection component.

This vulnerability was reported for LocalWEB2000 Standard Version 2.1.0. Other versions (such as the Professional Edition) may also be affected by this issue. 

http://target/./protectedfolder/protectedfile.htm 		

- 漏洞信息

5055
LocalWEB2000 Crafted Request Access Restriction Bypass
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

LocalWEB2000 contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a web request for a password-protected file is pre-pended with '/./', which will disclose protected file contents resulting in a loss of confidentiality.

- 时间线

2004-04-09 Unknow
2004-04-08 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue. The product is no longer supported by the vendor.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站