CVE-2004-0522
CVSS10.0
发布时间 :2004-08-06 00:00:00
修订时间 :2008-09-05 16:38:38
NMCO    

[原文]Gallery 1.4.3 and earlier allows remote attackers to bypass authentication and obtain Gallery administrator privileges.


[CNNVD]Gallery访问验证绕过漏洞(CNNVD-200408-041)

        
        Gallery是一款基于WEB的图象管理系统。
        Gallery存在访问验证错误,攻击者可以利用这个漏洞无需要正确验证获得"admin"权限。
        攻击者可以通过在GET、POST或COOKIE参数中传递特殊配置变量,可绕过Gallery验证过程,未授权以管理员权限访问应用程序。
        

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: COMPLETE [完全的信息泄露导致所有系统文件暴露]
完整性影响: COMPLETE [系统完整性可被完全破坏]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/o:debian:debian_linux:3.0::hppa
cpe:/o:debian:debian_linux:3.0::mips
cpe:/a:gallery_project:gallery:1.4.2
cpe:/o:debian:debian_linux:3.0::ia-32
cpe:/o:debian:debian_linux:3.0::m68k
cpe:/o:debian:debian_linux:3.0::s-390
cpe:/a:gallery_project:gallery:1.4_pl1
cpe:/o:debian:debian_linux:3.0::alpha
cpe:/o:debian:debian_linux:3.0::arm
cpe:/o:debian:debian_linux:3.0::ia-64
cpe:/a:gallery_project:gallery:1.4_pl2
cpe:/o:debian:debian_linux:3.0::mipsel
cpe:/o:debian:debian_linux:3.0::sparc
cpe:/a:gallery_project:gallery:1.4.1
cpe:/a:gallery_project:gallery:1.4.3_pl1
cpe:/a:gallery_project:gallery:1.4
cpe:/o:debian:debian_linux:3.0::ppc
cpe:/o:debian:debian_linux:3.0Debian Debian Linux 3.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0522
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0522
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-041
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/10451
(VENDOR_ADVISORY)  BID  10451
http://www.debian.org/security/2004/dsa-512
(VENDOR_ADVISORY)  DEBIAN  DSA-512
http://xforce.iss.net/xforce/xfdb/16301
(VENDOR_ADVISORY)  XF  gallery-user-bypass-authentication(16301)
http://security.gentoo.org/glsa/glsa-200406-10.xml
(UNKNOWN)  GENTOO  GLSA-200406-10
http://secunia.com/advisories/11752
(UNKNOWN)  SECUNIA  11752

- 漏洞信息

Gallery访问验证绕过漏洞
危急 未知
2004-08-06 00:00:00 2006-08-17 00:00:00
远程  
        
        Gallery是一款基于WEB的图象管理系统。
        Gallery存在访问验证错误,攻击者可以利用这个漏洞无需要正确验证获得"admin"权限。
        攻击者可以通过在GET、POST或COOKIE参数中传递特殊配置变量,可绕过Gallery验证过程,未授权以管理员权限访问应用程序。
        

- 公告与补丁

        厂商补丁:
        Gallery
        -------
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        Gallery Upgrade gallery-1.4.3-pl2.tar.gz
        
        http://prdownloads.sourceforge.net/gallery/gallery-1.4.3-pl2.tar.gz?download

- 漏洞信息

6524
Gallery init.php Authentication Bypass
Remote / Network Access Other
Loss of Integrity
Exploit Unknown

- 漏洞描述

Gallery contains a flaw that may allow a malicious user to gain administrative access. The issue is triggered when a specially crafted URL is passed to init.php to bypass authentication. It is possible that the flaw may allow unauthorized administrative access resulting in a loss of integrity.

- 时间线

2004-06-01 2004-06-01
Unknow Unknow

- 解决方案

Upgrade to version 1.4.3-pl2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站