CVE-2002-0908
CVSS5.0
发布时间 :2002-10-04 00:00:00
修订时间 :2008-09-05 16:29:16
NMCOES    

[原文]Directory traversal vulnerability in the web server for Cisco IDS Device Manager before 3.1.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the HTTPS request.


[CNNVD]Cisco IDS Device Manager任意文件读访问漏洞(CNNVD-200210-172)

        
        IDS Device Manager是一款CISCO IDS系统的WEB接口,由CISCO公司分发和维护。
        IDS Device Manager对用户输入缺少正确充分的检查,可导致远程攻击者查看系统上任意文件信息。
        由于没有对用户输入的数据进行有效的安全性检查,攻击者可以通过提交包含多个"../"字符串进行目录遍历,以IDS Device Manager的权限在目标系统中查看任意文件内容,导致系统敏感信息泄露。
        <**>

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0908
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-0908
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-172
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/4760
(VENDOR_ADVISORY)  BID  4760
http://www.iss.net/security_center/static/9174.php
(VENDOR_ADVISORY)  XF  cisco-ids-directory-traversal(9174)
http://archives.neohapsis.com/archives/bugtraq/2002-05/0214.html
(UNKNOWN)  BUGTRAQ  20020524 Cisco IDS Device Manager 3.1.1 Advisory

- 漏洞信息

Cisco IDS Device Manager任意文件读访问漏洞
中危 输入验证
2002-10-04 00:00:00 2005-10-20 00:00:00
远程  
        
        IDS Device Manager是一款CISCO IDS系统的WEB接口,由CISCO公司分发和维护。
        IDS Device Manager对用户输入缺少正确充分的检查,可导致远程攻击者查看系统上任意文件信息。
        由于没有对用户输入的数据进行有效的安全性检查,攻击者可以通过提交包含多个"../"字符串进行目录遍历,以IDS Device Manager的权限在目标系统中查看任意文件内容,导致系统敏感信息泄露。
        <**>

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 如果你需要使用WEB服务,请限制允许连接的IP地址,可以通过如下方法进行设置:
        1)以ROOT登录到IDS探测器,运行'sysconfig-sensor'。
        2)选择'5'项根据提示来设置ACL。
        3)退出
        注:这对伪造包不能起到防护作用。
        * 如果你不需要WEB服务,通过如下方法关闭:
        1)以ROOT登录到IDS探测器,运行'sysconfig-sensor'。
        2)选择'11'- IDS Device Manager'项,使当前模式关闭
        3)退出
        4)运行'cidServer version'检查WEB服务是否还继续运行
        上面两种方法可按照如下地址访问:
        
        http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csids/csids8/13870_01.htm

        厂商补丁:
        Cisco
        -----
        修正的3.1.2版本可在通过CISCO TAC获得:
         * +1 800 553 2447 (来自北美用户的免费电话)
         * +1 408 526 7209 (全球对方付费电话)
         * e-mail: tac@cisco.com

- 漏洞信息 (21456)

Cisco IDS Device Manager 3.1.1 Arbitrary File Read Access Vulnerability (EDBID:21456)
hardware remote
2002-05-17 Verified
0 Andrew Lopacki
N/A [点击下载]
source: http://www.securityfocus.com/bid/4760/info

IDS Device Manager is a web interface to the Cisco IDS systems. It is distributed and maintained by Cisco Systems.

The IDS Device Manager may allow a remote user to gain access to sensitive information on the system. Due to improper handling of user-supplied input, it is possible for a user to gain access to arbitrary files on the system using an elementary directory traversal attack. By placing a request to the process, with an appended dot-dot-slash (../) tag pointing to a file, a remote user may read the specified file on the affected system. 

https://example.com/../../../../../etc/shadow 		

- 漏洞信息

8865
Cisco IDS Device Manager Traversal Arbitrary File Access
Remote / Network Access Input Manipulation
Loss of Confidentiality Upgrade
Exploit Public Vendor Verified

- 漏洞描述

- 时间线

2002-05-24 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 3.1.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Cisco IDS Device Manager Arbitrary File Read Access Vulnerability
Input Validation Error 4760
Yes No
2002-05-17 12:00:00 2009-07-11 12:46:00
Discovered by Andrew Lopacki <Andrew.Lopacki@amsouth.com>.

- 受影响的程序版本

Cisco IDS Device Manager 3.1.1

- 漏洞讨论

IDS Device Manager is a web interface to the Cisco IDS systems. It is distributed and maintained by Cisco Systems.

The IDS Device Manager may allow a remote user to gain access to sensitive information on the system. Due to improper handling of user-supplied input, it is possible for a user to gain access to arbitrary files on the system using an elementary directory traversal attack. By placing a request to the process, with an appended dot-dot-slash (../) tag pointing to a file, a remote user may read the specified file on the affected system.

- 漏洞利用

This vulnerability may be exploited with a web browser. The following example has been provided:

https://example.com/../../../../../etc/shadow

- 解决方案

Reports indicate a fixed version number 3.1.2 will be available through Cisco TAC on May 18, 2002.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站