CVE-2004-1986
CVSS5.0
发布时间 :2004-04-04 00:00:00
修订时间 :2016-10-17 23:04:19
NMCOE    

[原文]Directory traversal vulnerability in modules.php in Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers with administrative privileges to read arbitrary files via a .. (dot dot) in the startdir parameter.


[CNNVD]Coppermine Photo Gallery 多个输入验证漏洞(CNNVD-200404-002)

        
        Coppermine Photo Gallery是一款基于WEB的图形库管理程序。
        Coppermine Photo Gallery多处对用户提交的输入缺少充分过滤,远程攻击者可以利用这些漏洞执行任意命令,获得COOKIE数据,获得敏感文件路径等信息。
        具体问题如下:
        1、路径泄露:
        直接访问一些配置脚本,可获得敏感路径信息。
        2、跨站脚本攻击
        coppermine/docs/menu.inc.php'对用户提交URI缺少过滤,攻击者利用这个漏洞可获得敏感信息。
        3、任意目录浏览:
        如果有PHP-Nuke管理员权限,访问coppermine模块可绕过目录限制访问其他文件。
        4、任意命令执行:
        如果有PHP-Nuke管理员权限,访问coppermine模块,可在coppermine配置面板部分参数中输入SHELL命令,而以WEB进程权限执行。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:coppermine:coppermine_photo_gallery:1.2
cpe:/a:francisco_burzi:php-nuke:7.2
cpe:/a:coppermine:coppermine_photo_gallery:1.0_rc3
cpe:/a:francisco_burzi:php-nuke:7.0
cpe:/a:coppermine:coppermine_photo_gallery:1.1_.0
cpe:/a:coppermine:coppermine_photo_gallery:1.2.1
cpe:/a:francisco_burzi:php-nuke:7.1
cpe:/a:francisco_burzi:php-nuke:7.0_final
cpe:/a:coppermine:coppermine_photo_gallery:1.1_beta_2
cpe:/a:francisco_burzi:php-nuke:6.9
cpe:/a:coppermine:coppermine_photo_gallery:1.2.2_b

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1986
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1986
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200404-002
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108360247732014&w=2
(UNKNOWN)  BUGTRAQ  20040502 [waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke]
http://securitytracker.com/id?1010001
(UNKNOWN)  SECTRACK  1010001
http://www.securityfocus.com/bid/10253
(VENDOR_ADVISORY)  BID  10253
http://www.waraxe.us/index.php?modname=sa&id=26
(VENDOR_ADVISORY)  MISC  http://www.waraxe.us/index.php?modname=sa&id=26
http://xforce.iss.net/xforce/xfdb/16042
(VENDOR_ADVISORY)  XF  coppermine-modulesphp-directory-traversal(16042)

- 漏洞信息

Coppermine Photo Gallery 多个输入验证漏洞
中危 输入验证
2004-04-04 00:00:00 2005-10-20 00:00:00
远程  
        
        Coppermine Photo Gallery是一款基于WEB的图形库管理程序。
        Coppermine Photo Gallery多处对用户提交的输入缺少充分过滤,远程攻击者可以利用这些漏洞执行任意命令,获得COOKIE数据,获得敏感文件路径等信息。
        具体问题如下:
        1、路径泄露:
        直接访问一些配置脚本,可获得敏感路径信息。
        2、跨站脚本攻击
        coppermine/docs/menu.inc.php'对用户提交URI缺少过滤,攻击者利用这个漏洞可获得敏感信息。
        3、任意目录浏览:
        如果有PHP-Nuke管理员权限,访问coppermine模块可绕过目录限制访问其他文件。
        4、任意命令执行:
        如果有PHP-Nuke管理员权限,访问coppermine模块,可在coppermine配置面板部分参数中输入SHELL命令,而以WEB进程权限执行。
        

- 公告与补丁

        厂商补丁:
        Coppermine
        ----------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.chezgreg.net/coppermine/

- 漏洞信息 (24073)

Coppermine Photo Gallery 1.x modules.php startdir Parameter Traversal Arbitrary File Access (EDBID:24073)
php webapps
2004-04-30 Verified
0 Janek Vind
N/A [点击下载]
source: http://www.securityfocus.com/bid/10253/info
 
Coppermine Photo Gallery is reported prone to multiple input-validation vulnerabilities, some of which may lead to arbitrary command execution. These issues occur because the application fails to properly sanitize and validate user-supplied input before using it in dynamic content and in function calls that execute system commands.
 
Attackers may exploit these issues to steal cookie-based authentication credentials, map the application root directory of the affected application, execute arbitrary commands, and include arbitrary files. Other attacks are also possible.

http://www.example.com/nuke72/modules.php?name=coppermine&file=searchnew&startdir=../.. 		

- 漏洞信息

5758
Coppermine Photo Gallery modules.php startdir Parameter Traversal Arbitrary File Access
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality
Exploit Public

- 漏洞描述

Coppermine Photo Gallery contains a flaw that allows a remote attacker to view arbitrary files outside of the web path. The issue is due to the 'modules.php' script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the 'startdir' variable.

- 时间线

2004-04-29 Unknow
2004-04-29 Unknow

- 解决方案

Upgrade to version 1.3beta or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站