CVE-2004-0241
CVSS10.0
发布时间 :2004-11-23 00:00:00
修订时间 :2016-10-17 22:42:17
NMCOES    

[原文]X-Cart 3.4.3 allows remote attackers to execute arbitrary commands via the perl_binary argument in (1) upgrade.php or (2) general.php.


[CNNVD]Qualiteam X-Cart远程命令执行漏洞(CNNVD-200411-162)

        
        X-Cart是一款基于PHP的电子商务程序。
        X-Cart没有充分过滤URI的参数值,远程攻击者可以利用这个漏洞以WEB进程权限执行任意命令。
        问题存在与'admin/general.php'脚本上,由于对[perl_binary]参数值缺少充分过滤,提交任意SHELL命令,可导致以WEB进程权限在系统上执行任意命令。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:qualiteam:x-cart:3.3.2Qualiteam X-Cart 3.3.2
cpe:/a:qualiteam:x-cart:3.4.11Qualiteam X-Cart 3.4.11
cpe:/a:qualiteam:x-cart:3.4.3Qualiteam X-Cart 3.4.3
cpe:/a:qualiteam:x-cart:3.2.0Qualiteam X-Cart 3.2.0
cpe:/a:qualiteam:x-cart:3.4.0Qualiteam X-Cart 3.4.0
cpe:/a:qualiteam:x-cart:3.2.1Qualiteam X-Cart 3.2.1
cpe:/a:qualiteam:x-cart:3.3.0Qualiteam X-Cart 3.3.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0241
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0241
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200411-162
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=107582648326448&w=2
(UNKNOWN)  BUGTRAQ  20040203 X-Cart vulnerability
http://www.securityfocus.com/bid/9560
(VENDOR_ADVISORY)  BID  9560
http://xforce.iss.net/xforce/xfdb/15034
(VENDOR_ADVISORY)  XF  xcart-perlbinary-execute-commands(15034)

- 漏洞信息

Qualiteam X-Cart远程命令执行漏洞
危急 输入验证
2004-11-23 00:00:00 2005-10-20 00:00:00
远程  
        
        X-Cart是一款基于PHP的电子商务程序。
        X-Cart没有充分过滤URI的参数值,远程攻击者可以利用这个漏洞以WEB进程权限执行任意命令。
        问题存在与'admin/general.php'脚本上,由于对[perl_binary]参数值缺少充分过滤,提交任意SHELL命令,可导致以WEB进程权限在系统上执行任意命令。
        

- 公告与补丁

        厂商补丁:
        Qualiteam
        ---------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.x-cart.com/

- 漏洞信息 (23636)

Qualiteam X-Cart 3.x general.php perl_binary Parameter Arbitrary Command Execution (EDBID:23636)
php webapps
2004-02-03 Verified
0 Philip
N/A [点击下载]
source: http://www.securityfocus.com/bid/9560/info

X-Cart has been reported to be prone to an issue that may allow remote attackers to execute arbitrary commands on the affected system. The issue is caused by a failure of the application to sanitize values specified by parameters in the URI. 

http://server/admin/general.php?mode=perlinfo&config[General][perl_binary]=/bin/ls -lR || 		

- 漏洞信息 (23637)

Qualiteam X-Cart 3.x upgrade.php perl_binary Parameter Arbitrary Command Execution (EDBID:23637)
php webapps
2004-02-03 Verified
0 Philip
N/A [点击下载]
source: http://www.securityfocus.com/bid/9560/info
 
X-Cart has been reported to be prone to an issue that may allow remote attackers to execute arbitrary commands on the affected system. The issue is caused by a failure of the application to sanitize values specified by parameters in the URI. 

http://server/admin/upgrade.php?prepatch_errorcode=1&patch_files[0][orig_file]=VERSION&perl_binary=/bin/rm -rf &patch_exe=..		

- 漏洞信息

3808
X-Cart general.php perl_binary Parameter Arbitrary Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

X-Cart contains a flaw that may allow a remote attacker to execute arbitrary commands. The problem is that the 'general.php' script does not validate user-supplied input to the "perl_binary" variable. With a specially crafted URL request a remote attacker could execute arbitrary commands with the privileges of the Web server resulting in a loss of integrity.

- 时间线

2004-02-03 Unknow
2004-02-03 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Qualiteam X-Cart Remote Command Execution Vulnerability
Input Validation Error 9560
Yes No
2004-02-03 12:00:00 2009-07-12 02:06:00
Discovery of this issue has been credited to Philip <securityfocus@magicwebsolutions.co.uk>.

- 受影响的程序版本

Qualiteam X-Cart 3.4.11
Qualiteam X-Cart 3.4.3
Qualiteam X-Cart 3.4 .0
Qualiteam X-Cart 3.3.2
Qualiteam X-Cart 3.3 .0
Qualiteam X-Cart 3.2.1
Qualiteam X-Cart 3.2 .0
Qualiteam X-Cart 3.5.4
Qualiteam X-Cart 3.5.2
Qualiteam X-Cart 3.5.1
Qualiteam X-Cart 3.5 .0
Qualiteam X-Cart 3.4.12

- 不受影响的程序版本

Qualiteam X-Cart 3.5.4
Qualiteam X-Cart 3.5.2
Qualiteam X-Cart 3.5.1
Qualiteam X-Cart 3.5 .0
Qualiteam X-Cart 3.4.12

- 漏洞讨论

X-Cart has been reported to be prone to an issue that may allow remote attackers to execute arbitrary commands on the affected system. The issue is caused by a failure of the application to sanitize values specified by parameters in the URI.

- 漏洞利用

No exploit is required to leverage this issue. The following proof of concept has been provided:

http://server/admin/upgrade.php?prepatch_errorcode=1&amp;patch_files[0][orig_file]=VERSION&amp;perl_binary=/bin/rm -rf &amp;patch_exe=..

http://server/admin/general.php?mode=perlinfo&amp;config[General][perl_binary]=/bin/ls -lR ||

- 解决方案

X-Cart versions 3.5.0 and higher and 3.4.12 and higher are not affected by this vulnerability.

The vendor has released a patch to fix this issue.


Qualiteam X-Cart 3.2 .0

Qualiteam X-Cart 3.2.1

Qualiteam X-Cart 3.3 .0

Qualiteam X-Cart 3.3.2

Qualiteam X-Cart 3.4 .0

Qualiteam X-Cart 3.4.11

Qualiteam X-Cart 3.4.3

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站