CVE-2004-2493
CVSS4.0
发布时间 :2004-12-31 00:00:00
修订时间 :2008-09-05 16:44:17
NMCO    

[原文]Directory traversal vulnerability in Groupmax World Wide Web (GmaxWWW) 2 and 3, and Desktop 5, 6, and Desktop for Jichitai allows remote authenticated users to read arbitrary .html files via the template name parameter.


[CNNVD]Groupmax World Wide Web跨站脚本攻击(XSS)和目录遍历漏洞(CNNVD-200412-1070)

        Groupmax World Wide Web (GmaxWWW)版本2和版本3,以及Desktop版本5,版本6和Jichitai Desktop存在目录遍历漏洞。远程认证用户可以借助template name参数读取任意.html文件。

- CVSS (基础分值)

CVSS分值: 4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_52_b
cpe:/a:hitachi:groupmax_world_wide_web:02_20_a
cpe:/a:hitachi:groupmax_world_wide_web_desktop:05_11_f
cpe:/a:hitachi:groupmax_world_wide_web_desktop:05_00
cpe:/a:hitachi:groupmax_world_wide_web_desktop:5
cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_52::jichitai
cpe:/a:hitachi:groupmax_world_wide_web:03_10_h
cpe:/a:hitachi:groupmax_world_wide_web:03_11_b
cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_52
cpe:/a:hitachi:groupmax_world_wide_web:02_00
cpe:/a:hitachi:groupmax_world_wide_web:02_20
cpe:/a:hitachi:groupmax_world_wide_web_desktop:gold::jichitai
cpe:/a:hitachi:groupmax_world_wide_web:3
cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_50_b
cpe:/a:hitachi:groupmax_world_wide_web_desktop:05_11_i
cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_50_c
cpe:/a:hitachi:groupmax_world_wide_web:02_31_i
cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_51_b
cpe:/a:hitachi:groupmax_world_wide_web:03_00
cpe:/a:hitachi:groupmax_world_wide_web_desktop:6
cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_51
cpe:/a:hitachi:groupmax_world_wide_web_desktop:05_11_j
cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_51_c
cpe:/a:hitachi:groupmax_world_wide_web:2
cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_51::jichitai
cpe:/a:hitachi:groupmax_world_wide_web_desktop:06_00

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2493
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-2493
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200412-1070
(官方数据源) CNNVD

- 其它链接及资源

http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html
(VENDOR_ADVISORY)  CONFIRM  http://www.hitachi-support.com/security_e/vuls_e/HS04-007_e/01-e.html
http://xforce.iss.net/xforce/xfdb/18278
(UNKNOWN)  XF  groupmax-directory-traversal(18278)
http://www.securityfocus.com/bid/11773
(UNKNOWN)  BID  11773
http://www.osvdb.org/12153
(UNKNOWN)  OSVDB  12153
http://secunia.com/advisories/13321
(UNKNOWN)  SECUNIA  13321

- 漏洞信息

Groupmax World Wide Web跨站脚本攻击(XSS)和目录遍历漏洞
中危 路径遍历
2004-12-31 00:00:00 2006-01-25 00:00:00
远程  
        Groupmax World Wide Web (GmaxWWW)版本2和版本3,以及Desktop版本5,版本6和Jichitai Desktop存在目录遍历漏洞。远程认证用户可以借助template name参数读取任意.html文件。

- 公告与补丁

        The vendor has released an advisory along with fixes to address these issues. Users of affected packages should contact the vendor for further information on obtaining fixes.

- 漏洞信息

12153
Hitachi Groupmax Traversal Arbitrary HTML File Access
Remote / Network Access Input Manipulation
Loss of Confidentiality
Exploit Unknown Vendor Verified

- 漏洞描述

Groupmax contains a flaw that allows a remote attacker logged in to GmaxWWW to retrieve any HTML files on the web server. The issue is due to the GmaxWWW not properly sanitizing user input allowing directory traversal, resulting in a loss of confidentiality.

- 时间线

2004-11-29 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 06-52-/C or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站