CVE-2004-1601
CVSS7.5
发布时间 :2004-10-16 00:00:00
修订时间 :2016-10-17 22:57:24
NMCOE    

[原文]Directory traversal vulnerability in index.php in CoolPHP 1.0-stable allows remote attackers to access arbitrary files and execute local PHP scripts via a .. (dot dot) in the op parameter.


[CNNVD]CoolPHP远程任意文件查看及脚本执行漏洞(CNNVD-200410-021)

        
        CoolPHP是一款基于PHP的网站构建系统。
        CoolPHP多处没有正确验证用户提交的输入,远程攻击者可以利用这个漏洞以WEB进程权限在系统上执行任意命令或进行脚本执行攻击。
        'index.php'对用户提交给"op"参数的数据缺少充分锅炉,提交包含多个'../'的字符作为参数数据,可绕过WEB ROOT限制以系统权限查看文件内容。
        另外对'buscar'模块的'query'参数和'userinfo'模块的'nick'参数缺少充分HTML代码检查,构建恶意链接,诱使用户访问,可能泄露用户敏感信息。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1601
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1601
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200410-021
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=109810941419669&w=2
(UNKNOWN)  BUGTRAQ  20041016 Multiple Vulnerabilities in CoolPHP
http://securitytracker.com/id?1011748
(VENDOR_ADVISORY)  SECTRACK  1011748
http://www.securityfocus.com/bid/11437
(UNKNOWN)  BID  11437
http://xforce.iss.net/xforce/xfdb/17745
(VENDOR_ADVISORY)  XF  coolphp-dotdot-directory-traversal(17745)

- 漏洞信息

CoolPHP远程任意文件查看及脚本执行漏洞
高危 输入验证
2004-10-16 00:00:00 2006-09-22 00:00:00
远程  
        
        CoolPHP是一款基于PHP的网站构建系统。
        CoolPHP多处没有正确验证用户提交的输入,远程攻击者可以利用这个漏洞以WEB进程权限在系统上执行任意命令或进行脚本执行攻击。
        'index.php'对用户提交给"op"参数的数据缺少充分锅炉,提交包含多个'../'的字符作为参数数据,可绕过WEB ROOT限制以系统权限查看文件内容。
        另外对'buscar'模块的'query'参数和'userinfo'模块的'nick'参数缺少充分HTML代码检查,构建恶意链接,诱使用户访问,可能泄露用户敏感信息。
        

- 公告与补丁

        厂商补丁:
        CoolPHP
        -------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://cphp.sourceforge.net/

- 漏洞信息 (24685)

CoolPHP 1.0 Multiple Remote Input Validation Vulnerabilities (EDBID:24685)
php webapps
2004-10-16 Verified
0 R00tCr4ck
N/A [点击下载]
source: http://www.securityfocus.com/bid/11437/info

Reportedly CoolPHP is affected by multiple remote input validation vulnerabilities. These issues are due to a failure of the application to properly sanitize user supplied input prior to using it to make critical actions.

An attacker can leverage these issues to steal cookie-based authentication credentials as well as carry out other malicious activities through cross-site scripting attacks. An attacker can also leverage this issue to execute arbitrary server-side scripts using file include attacks.

Cross-Site Scripting:
http://www.example.com/index.php?op=buscar&query=<script language=javascript>window.alert(document.cookie);</script>
http://www.example.com/index.php?op=buscar&query=%3Cscript%20language=javascript%3Ewindow.alert%28document.cookie%29;%3C/script%3E
http://www.example.com/index.php?op=userinfo&nick=<script language=javascript>window.alert(document.cookie);</script>

File Include:
http://www.example.com/index.php?op=%2E%2E%2F%2E%2E%2F%2E%2E%2F%2E%2E%2FattackerControlledDirectory/attackerScript.php		

- 漏洞信息

10901
CoolPHP index.php Arbitrary Command Execution/File Access
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

CoolPHP contains a flaw that allows a remote attacker to include arbitrary files on the remote system, allowing for remote command execution. The issue is due to the index.php script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the 'op' variable. This may allow an attacker to specify an arbitrary file on the system to be read and processed by CoolPHP.

- 时间线

2004-10-16 Unknow
2004-10-16 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站