CVE-2004-0259
CVSS9.3
发布时间 :2004-11-23 00:00:00
修订时间 :2016-10-17 22:42:37
NMCOS    

[原文]The check_referer() function in Formmail.php 5.0 and earlier allows remote attackers to bypass access restrictions via an empty or spoofed HTTP Referer, as demonstrated using an application on the same web server that contains a cross-site scripting (XSS) issue.


[CNNVD]Joe Lumbroso Jack's Formmail.php未授权远程文件上传漏洞(CNNVD-200411-042)

        Formmail.php 5.0版本及之前版本中的check_referer()函数存在漏洞。远程攻击者借助空的或者欺骗的HTTP参照页绕过访问控制,正如使用含有跨站脚本(XSS)问题的相同网络服务器上的应用。

- CVSS (基础分值)

CVSS分值: 9.3 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:joe_lumbroso_acks:formmail.php:5.0
cpe:/a:joe_lumbroso_acks:formmail.php:2.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0259
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0259
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200411-042
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=107619109629629&w=2
(UNKNOWN)  BUGTRAQ  20040206 formmail (PHP) Upload file using CSS
http://www.securityfocus.com/bid/9591
(VENDOR_ADVISORY)  BID  9591
http://xforce.iss.net/xforce/xfdb/15079
(VENDOR_ADVISORY)  XF  jack-formmail-file-upload(15079)

- 漏洞信息

Joe Lumbroso Jack's Formmail.php未授权远程文件上传漏洞
高危 跨站脚本
2004-11-23 00:00:00 2005-10-20 00:00:00
远程  
        Formmail.php 5.0版本及之前版本中的check_referer()函数存在漏洞。远程攻击者借助空的或者欺骗的HTTP参照页绕过访问控制,正如使用含有跨站脚本(XSS)问题的相同网络服务器上的应用。

- 公告与补丁

        Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .

- 漏洞信息

3876
Jack's formmail.php Malformed HTTP Referer Arbitrary File Upload
Remote / Network Access Authentication Management, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

Jack's FormMail.php contains a flaw that may allow a malicious user to upload arbitrary files, due to an absence of validation in the 'check_referer()' function. It is possible that the flaw may allow execution of arbitrary code in uploaded files resulting in a loss of confidentiality, integrity, and/or availability.

- 时间线

2004-02-06 2004-02-06
Unknow Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround(s): Write protect all public folders to ensure that files can only be written to a dedicated and protected upload folder.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Joe Lumbroso Jack's Formmail.php Unauthorized Remote File Upload Vulnerability
Origin Validation Error 9591
Yes No
2004-02-06 12:00:00 2009-07-12 02:06:00
The disclosure of this issue has been credited to Himeur Nourredine <lostnoobs@security-challenge.com>.

- 受影响的程序版本

Joe Lumbroso Jack's FormMail.php 5.0
Joe Lumbroso Jack's FormMail.php 2.0

- 漏洞讨论

It has been reported that Jack's Formmail.php may be prone to an unauthorized file upload vulnerability that may allow a remote attacker to gain unauthorized access to a vulnerable server and upload arbitrary files. Due to improper validation performed in the 'check_referer()' function, an attacker can bypass the checks by supplying an empty value for HTTP referer. This issue may then allow an attacker to upload a file via the 'css' variable of 'file.php' script.

Although unconfirmed, Formmail.php versions 5.0 and prior may be affected by this issue.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com &lt;mailto:vuldb@securityfocus.com&gt;.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站