CVE-2002-1483
CVSS5.0
发布时间 :2003-04-22 00:00:00
修订时间 :2008-09-05 16:30:43
NMCOES    

[原文]db4web_c and db4web_c.exe programs in DB4Web 3.4 and 3.6 allow remote attackers to read arbitrary files via an HTTP request whose argument is a filename of the form (1) C: (drive letter), (2) //absolute/path (double-slash), or (3) .. (dot-dot).


[CNNVD]DB4Web远程文件泄露漏洞(CNNVD-200304-117)

        
        DB4Web是一款应用服务程序,允许通过WEB对关系数据库和其他信息资源进行读写访问,此应用程序可使用在Windows、Linux和各类Unix操作系统下。
        DB4Web存在目录遍历问题,远程攻击者可以利用这个漏洞以WEB权限查看系统任意文件内容。
        DB4Web中的db4web_c(Unix/Linux系统)和db4web_c.exe(MS Windows系统)二进制程序对用户提交的畸形输入请求缺少检查,攻击者可能以WEB权限查看系统中任意文件内容,造成敏感信息泄露。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:db4web:db4web:3.6
cpe:/a:db4web:db4web:3.4

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1483
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1483
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200304-117
(官方数据源) CNNVD

- 其它链接及资源

http://www.iss.net/security_center/static/10123.php
(VENDOR_ADVISORY)  XF  db4web-db4webc-directory-traversal(10123)
http://www.securityfocus.com/bid/5723
(UNKNOWN)  BID  5723
http://www.db4web.de/download/homepage/hotfix/readme_en.txt
(UNKNOWN)  CONFIRM  http://www.db4web.de/download/homepage/hotfix/readme_en.txt
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0124.html
(VENDOR_ADVISORY)  VULNWATCH  20020919 Advisory: File disclosure in DB4Web
http://archives.neohapsis.com/archives/bugtraq/2002-09/0197.html
(VENDOR_ADVISORY)  BUGTRAQ  20020917 Advisory: File disclosure in DB4Web

- 漏洞信息

DB4Web远程文件泄露漏洞
中危 输入验证
2003-04-22 00:00:00 2006-08-31 00:00:00
远程  
        
        DB4Web是一款应用服务程序,允许通过WEB对关系数据库和其他信息资源进行读写访问,此应用程序可使用在Windows、Linux和各类Unix操作系统下。
        DB4Web存在目录遍历问题,远程攻击者可以利用这个漏洞以WEB权限查看系统任意文件内容。
        DB4Web中的db4web_c(Unix/Linux系统)和db4web_c.exe(MS Windows系统)二进制程序对用户提交的畸形输入请求缺少检查,攻击者可能以WEB权限查看系统中任意文件内容,造成敏感信息泄露。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 设置访问控制,只允许可信用户访问DB4Web。
        厂商补丁:
        DB4Web
        ------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        DB4Web DB4Web 3.4:
        DB4Web Hotfix patch_V34BL27_HP-UX.tar
        
        http://www.db4web.de/download/homepage/hotfix/patch_V34BL27_HP-UX.tar

        DB4Web Hotfix patch_V34BL27_Linux.tar
        
        http://www.db4web.de/download/homepage/hotfix/patch_V34BL27_Linux.tar

        DB4Web Hotfix patch_V34BL27_SINIX.tar
        
        http://www.db4web.de/download/homepage/hotfix/patch_V34BL27_SINIX.tar

        DB4Web Hotfix patch_V34BL27_SunOS.tar
        
        http://www.db4web.de/download/homepage/hotfix/patch_V34BL27_SunOS.tar

        DB4Web Hotfix patch_V34BL27_NT.zip
        
        http://www.db4web.de/download/homepage/hotfix/patch_V34BL27_NT.zip

        DB4Web DB4Web 3.6:
        DB4Web Hotfix patch_V36BL6_HP-UX.tar
        
        http://www.db4web.de/download/homepage/hotfix/patch_V36BL6_HP-UX.tar

        DB4Web Hotfix patch_V36BL6_Linux.tar
        
        http://www.db4web.de/download/homepage/hotfix/patch_V36BL6_Linux.tar

        DB4Web Hotfix patch_V36BL6_SINIX.tar
        
        http://www.db4web.de/download/homepage/hotfix/patch_V36BL6_SINIX.tar

        DB4Web Hotfix patch_V36BL6_SunOS.tar
        
        http://www.db4web.de/download/homepage/hotfix/patch_V36BL6_SunOS.tar

        DB4Web Hotfix patch_V36BL6_NT.zip
        
        http://www.db4web.de/download/homepage/hotfix/patch_V36BL6_NT.zip

- 漏洞信息 (21800)

DB4Web 3.4/3.6 File Disclosure Vulnerability (EDBID:21800)
multiple remote
2002-09-17 Verified
0 Stefan Bagdohn
N/A [点击下载]
source: http://www.securityfocus.com/bid/5723/info

DB4Web is an application server that allows read and write access to relational databases and other information sources, via the web. The application is available for Windows, Linux, and various Unix platforms.

A directory traversal bug exists in DB4Web.

By passing a maliciously crafted query to the application, an attacker can potentially gain access to arbitrary system files. This is due to the application insufficiently validating the user supplied input.

On MS Windows systems the URL to retrieve the boot.ini file would
look like:
http://db4web.server.system/scripts/db4web_c.exe/dbdirname/c%3A%5Cboot.ini

On Linux/Unix servers the following URL will show /etc/hosts:
http://db4web.server.system/cgi-bin/db4web_c/dbdirname//etc/hosts		

- 漏洞信息

14484
DB4Web Server db4web_c Filename Request Traversal Arbitrary File Access
Remote / Network Access Input Manipulation
Loss of Confidentiality Patch / RCS
Vendor Verified

- 漏洞描述

- 时间线

2002-09-17 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

DB4Web File Disclosure Vulnerability
Input Validation Error 5723
Yes No
2002-09-17 12:00:00 2009-07-11 05:06:00
Discovery credited to Stefan Bagdohn.

- 受影响的程序版本

DB4Web DB4Web 3.6
DB4Web DB4Web 3.4

- 漏洞讨论

DB4Web is an application server that allows read and write access to relational databases and other information sources, via the web. The application is available for Windows, Linux, and various Unix platforms.

A directory traversal bug exists in DB4Web.

By passing a maliciously crafted query to the application, an attacker can potentially gain access to arbitrary system files. This is due to the application insufficiently validating the user supplied input.

- 漏洞利用

This issue may be exploited with a web browser.

The following proof of concept has been supplied by Stefan Bogdohn:

On MS Windows systems the URL to retrieve the boot.ini file would
look like:
http://db4web.server.system/scripts/db4web_c.exe/dbdirname/c%3A%5Cboot.ini

On Linux/Unix servers the following URL will show /etc/hosts:
http://db4web.server.system/cgi-bin/db4web_c/dbdirname//etc/hosts

- 解决方案

The vendor has released the following patches:


DB4Web DB4Web 3.4

DB4Web DB4Web 3.6

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站