CVE-2004-2044
CVSS7.5
发布时间 :2004-06-01 00:00:00
修订时间 :2016-10-17 23:05:26
NMCOE    

[原文]PHP-Nuke 7.3, and other products that use the PHP-Nuke codebase such as the Nuke Cops betaNC PHP-Nuke Bundle, OSCNukeLite 3.1, and OSC2Nuke 7x do not properly use the eregi() PHP function with $_SERVER['PHP_SELF'] to identify the calling script, which allows remote attackers to directly access scripts, obtain path information via a PHP error message, and possibly gain access, as demonstrated using an HTTP request that contains the "admin.php" string.


[CNNVD]PHP-Nuke直接脚本访问安全绕过漏洞(CNNVD-200406-037)

        
        PHP-Nuke是一个广为流行的网站创建和管理工具,它可以使用很多数据库软件作为后端,比如MySQL、PostgreSQL、mSQL、Interbase、Sybase等。
        PHP-Nuke对文件脚本直接访问缺少正确限制,远程攻击者可以利用这个漏洞获得敏感信息。
        由于对重要脚本没有进行任何限制,攻击者可以直接访问一些如'admin.php'脚本的敏感文件,获得敏感信息。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:francisco_burzi:php-nuke:5.4
cpe:/a:francisco_burzi:php-nuke:7.2
cpe:/a:francisco_burzi:php-nuke:5.1
cpe:/a:francisco_burzi:php-nuke:6.0
cpe:/a:francisco_burzi:php-nuke:5.2
cpe:/a:francisco_burzi:php-nuke:7.0
cpe:/a:francisco_burzi:php-nuke:6.6
cpe:/a:francisco_burzi:php-nuke:5.0
cpe:/a:francisco_burzi:php-nuke:6.5_rc1
cpe:/a:francisco_burzi:php-nuke:5.0.1
cpe:/a:francisco_burzi:php-nuke:7.1
cpe:/a:francisco_burzi:php-nuke:7.0_final
cpe:/a:francisco_burzi:php-nuke:5.2a
cpe:/o:trustix:secure_linux:2.1Trustix Secure Linux 2.1
cpe:/o:trustix:secure_linux:2.0Trustix Secure Linux 2.0
cpe:/a:francisco_burzi:php-nuke:6.5_rc2
cpe:/a:francisco_burzi:php-nuke:6.5_beta1
cpe:/a:francisco_burzi:php-nuke:6.7
cpe:/a:francisco_burzi:php-nuke:5.5
cpe:/a:francisco_burzi:php-nuke:7.3
cpe:/a:francisco_burzi:php-nuke:5.3.1
cpe:/a:francisco_burzi:php-nuke:5.6
cpe:/a:francisco_burzi:php-nuke:6.5
cpe:/a:francisco_burzi:php-nuke:6.5_final
cpe:/a:oscommerce:osc2nuke:7x_1.0
cpe:/a:paul_laudanski:betanc_php-nuke:bundle
cpe:/a:francisco_burzi:php-nuke:6.9
cpe:/a:francisco_burzi:php-nuke:6.5_rc3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2044
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2044
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200406-037
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/bugtraq/2004-06/0005.html
(UNKNOWN)  BUGTRAQ  20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops betaNC Bundle
http://archives.neohapsis.com/archives/bugtraq/2004-06/0006.html
(UNKNOWN)  BUGTRAQ  20040601 [Squid 2004-OSC2Nuke-001] Inadequate Security Checking in OSC2Nuke
http://marc.info/?l=bugtraq&m=108611606320559&w=2
(UNKNOWN)  BUGTRAQ  20040601 [Squid 2004-betaNC-001] Inadequate Security Checking in NukeCops
http://marc.info/?l=bugtraq&m=108611643614881&w=2
(UNKNOWN)  BUGTRAQ  20040601 [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke
http://marc.info/?l=bugtraq&m=108662955105757&w=2
(UNKNOWN)  BUGTRAQ  20040606 Re: [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke
http://www.securityfocus.com/bid/10447
(VENDOR_ADVISORY)  BID  10447
http://xforce.iss.net/xforce/xfdb/16294
(VENDOR_ADVISORY)  XF  phpnuke-eregi-path-disclosure(16294)
http://xforce.iss.net/xforce/xfdb/16296
(VENDOR_ADVISORY)  XF  osc2nuke-eregi-path-disclosure(16296)
http://xforce.iss.net/xforce/xfdb/16297
(UNKNOWN)  XF  oscnukelite-eregi-path-disclosure(16297)
http://xforce.iss.net/xforce/xfdb/16298
(VENDOR_ADVISORY)  XF  nukecops-ergei-path-disclosure(16298)

- 漏洞信息

PHP-Nuke直接脚本访问安全绕过漏洞
高危 访问验证错误
2004-06-01 00:00:00 2005-10-20 00:00:00
远程  
        
        PHP-Nuke是一个广为流行的网站创建和管理工具,它可以使用很多数据库软件作为后端,比如MySQL、PostgreSQL、mSQL、Interbase、Sybase等。
        PHP-Nuke对文件脚本直接访问缺少正确限制,远程攻击者可以利用这个漏洞获得敏感信息。
        由于对重要脚本没有进行任何限制,攻击者可以直接访问一些如'admin.php'脚本的敏感文件,获得敏感信息。
        

- 公告与补丁

        厂商补丁:
        Francisco Burzi
        ---------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.phpnuke.org

- 漏洞信息 (24166)

PHP-Nuke 5.x/6.x/7.x Direct Script Access Security Bypass Vulnerability (EDBID:24166)
php webapps
2004-06-01 Verified
0 Squid
N/A [点击下载]
source: http://www.securityfocus.com/bid/10447/info

PHP-Nuke is affected by a direct script access security vulnerability. This issue is due to a failure to properly validate the location and name of the file being accessed.

This issue will allow an attacker to gain access to sensitive scripts such as the 'admin.php' script. The attacker may be able to exploit this unauthorized access to carry out attacks against the affected application.

http://www.example.com/admin/case/case.adminfaq.php/admin.php?op=FaqCatGo
http://www.example.com/admin/admin.php/index.php
http://www.example.com/admin/modules/blocks.php/admin.php 		

- 漏洞信息

60302
Nuke Cops eregi() Function Calling Script Access Path Disclosure
Remote / Network Access Information Disclosure
Loss of Confidentiality
Exploit Public

- 漏洞描述

Unknown or Incomplete

- 时间线

2004-06-01 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站