CVE-2005-0259
CVSS6.4
发布时间 :2005-03-14 00:00:00
修订时间 :2008-09-10 15:35:13
NMCOPS    

[原文]phpBB 2.0.11, and possibly other versions, with remote avatars and avatar uploading enabled, allows local users to read arbitrary files by providing both a local and remote location for an avatar, then modifying the "Upload Avatar from a URL:" field to reference the target file.


[CNNVD]phpBB Group phpBB2 任意文件泄露漏洞(CNNVD-200503-111)

        phpBB Group phpBB2是一款开放源代码PHP论坛程序。
        phpBB2对用户提交的URL输入缺少充分过滤,远程攻击者可以利用这个漏洞以WEB权限查看系统任意文件。
        当用户请求上传一个avatar时,变量'$user_avatar_upload'默认从远程URL上传,'$avatar_mode'变量默认从本地电脑上传。变量'$user_avatar_upload'是否包含远程URL或临时服务器名依据要上传源avatar是本地或远程。如果本地和远程上传同时请求,临时上传位置就被远程服务器名代替,这之后会被拷贝到新的位置。通过提交一个本地路径代替URL,攻击者可以执行任意copy()命令。
        攻击者利用这个输入验证问题通过从本地机器中选择一个avatar并在"Upload Avatar from a URL:"字段中选择任意文件如/etc/passwd,当avatar提交时,提交的avatar目标图象就会包含请求的文件内容。
        

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:phpbb_group:phpbb:2.0.4
cpe:/a:phpbb_group:phpbb:2.0.0
cpe:/a:phpbb_group:phpbb:2.0_beta1
cpe:/a:phpbb_group:phpbb:2.0.6c
cpe:/a:phpbb_group:phpbb:2.0.10
cpe:/a:phpbb_group:phpbb:2.0_rc3
cpe:/a:phpbb_group:phpbb:2.0.7
cpe:/a:phpbb_group:phpbb:2.0.9
cpe:/a:phpbb_group:phpbb:2.0.6
cpe:/a:phpbb_group:phpbb:2.0_rc1
cpe:/a:phpbb_group:phpbb:2.0.1
cpe:/a:phpbb_group:phpbb:2.0.6d
cpe:/a:phpbb_group:phpbb:2.0.8
cpe:/a:phpbb_group:phpbb:2.0.8a
cpe:/a:phpbb_group:phpbb:2.0_rc4
cpe:/a:phpbb_group:phpbb:2.0.2
cpe:/a:phpbb_group:phpbb:2.0.11
cpe:/a:phpbb_group:phpbb:2.0.7a
cpe:/a:phpbb_group:phpbb:2.0.3
cpe:/a:phpbb_group:phpbb:2.0_rc2
cpe:/a:phpbb_group:phpbb:2.0.5

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0259
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0259
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200503-111
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/774686
(UNKNOWN)  CERT-VN  VU#774686
http://www.idefense.com/application/poi/display?id=204&type=vulnerabilities
(VENDOR_ADVISORY)  IDEFENSE  20050222 phpBB Group phpBB Arbitrary File Disclosure Vulnerability
http://www.phpbb.com/support/documents.php?mode=changelog
(VENDOR_ADVISORY)  CONFIRM  http://www.phpbb.com/support/documents.php?mode=changelog
http://www.gentoo.org/security/en/glsa/glsa-200503-02.xml
(UNKNOWN)  GENTOO  GLSA-200503-02
http://secunia.com/advisories/14362/
(UNKNOWN)  SECUNIA  14362

- 漏洞信息

phpBB Group phpBB2 任意文件泄露漏洞
中危 输入验证
2005-03-14 00:00:00 2005-10-20 00:00:00
远程  
        phpBB Group phpBB2是一款开放源代码PHP论坛程序。
        phpBB2对用户提交的URL输入缺少充分过滤,远程攻击者可以利用这个漏洞以WEB权限查看系统任意文件。
        当用户请求上传一个avatar时,变量'$user_avatar_upload'默认从远程URL上传,'$avatar_mode'变量默认从本地电脑上传。变量'$user_avatar_upload'是否包含远程URL或临时服务器名依据要上传源avatar是本地或远程。如果本地和远程上传同时请求,临时上传位置就被远程服务器名代替,这之后会被拷贝到新的位置。通过提交一个本地路径代替URL,攻击者可以执行任意copy()命令。
        攻击者利用这个输入验证问题通过从本地机器中选择一个avatar并在"Upload Avatar from a URL:"字段中选择任意文件如/etc/passwd,当avatar提交时,提交的avatar目标图象就会包含请求的文件内容。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.phpbb.com/downloads.php

- 漏洞信息 (F36412)

Gentoo Linux Security Advisory 200503-2 (PacketStormID:F36412)
2005-03-03 00:00:00
Gentoo  security.gentoo.org
advisory,remote,arbitrary,local,php
linux,gentoo
CVE-2005-0258,CVE-2005-0259
[点击下载]

Gentoo Linux Security Advisory GLSA 200503-02 - It was discovered that phpBB contains a flaw in the session handling code and a path disclosure bug. AnthraX101 discovered that phpBB allows local users to read arbitrary files, if the Enable remote avatars and Enable avatar uploading options are set (CVE-2005-0259). He also found out that incorrect input validation in usercp_avatar.php and usercp_register.php makes phpBB vulnerable to directory traversal attacks, if the Gallery avatars setting is enabled (CVE-2005-0258). Versions less than 2.0.13 are affected.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200503-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: Normal
     Title: phpBB: Multiple vulnerabilities
      Date: March 01, 2005
      Bugs: #82955
        ID: 200503-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Several vulnerabilities allow remote attackers to gain phpBB
administrator rights or expose and manipulate sensitive data.

Background
==========

phpBB is an Open Source bulletin board package.

Affected packages
=================

    -------------------------------------------------------------------
     Package         /  Vulnerable  /                       Unaffected
    -------------------------------------------------------------------
  1  www-apps/phpBB      < 2.0.13                            >= 2.0.13

Description
===========

It was discovered that phpBB contains a flaw in the session handling
code and a path disclosure bug. AnthraX101 discovered that phpBB allows
local users to read arbitrary files, if the "Enable remote avatars" and
"Enable avatar uploading" options are set (CAN-2005-0259). He also
found out that incorrect input validation in "usercp_avatar.php" and
"usercp_register.php" makes phpBB vulnerable to directory traversal
attacks, if the "Gallery avatars" setting is enabled (CAN-2005-0258).

Impact
======

Remote attackers can exploit the session handling flaw to gain phpBB
administrator rights. By providing a local and a remote location for an
avatar and setting the "Upload Avatar from a URL:" field to point to
the target file, a malicious local user can read arbitrary local files.
By inserting "/../" sequences into the "avatarselect" parameter, a
remote attacker can exploit the directory traversal vulnerability to
delete arbitrary files. A flaw in the "viewtopic.php" script can be
exploited to expose the full path of PHP scripts.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All phpBB users should upgrade to the latest available version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-apps/phpBB-2.0.13"

References
==========

  [ 1 ] CAN-2005-0258
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0258
  [ 2 ] CAN-2005-0259
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0259
  [ 3 ] phpBB announcement
        http://www.phpbb.com/phpBB/viewtopic.php?f=14&t=267563

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200503-02.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

    

- 漏洞信息 (F36275)

iDEFENSE Security Advisory 2005-02-22.1 (PacketStormID:F36275)
2005-02-26 00:00:00
iDefense Labs,AnthraX101  idefense.com
advisory,remote,arbitrary
CVE-2005-0259
[点击下载]

iDEFENSE Security Advisory 02.22.05 - Remote exploitation of an input validation vulnerability in the phpBB Group's phpBB2 bulletin board system allows attackers to read the contents of arbitrary system files under the privileges of the webserver.

phpBB Group phpBB Arbitrary File Disclosure Vulnerability

iDEFENSE Security Advisory 02.22.05
www.idefense.com/application/poi/display?id=204&type=vulnerabilities
February 22, 2005

I. BACKGROUND

phpBB is an open source bulletin board package written in the PHP web
scripting language. More information about phpBB is available from:

    http://www.phpbb.com/

II. DESCRIPTION

Remote exploitation of an input validation vulnerability in the phpBB
Group's phpBB2 bulletin board system allows attackers to read the
contents of arbitrary system files under the privileges of the web
server.

phpBB is an open-source web-based bulletin board system written in PHP.
The problem specifically exists due to an input validation error that
allows a remote attacker to control the arguments in a call to copy().

When a user requests to upload an avatar, the variable
'$user_avatar_upload' defaults to uploading from a remote URL and the
variable '$avatar_mode' defaults to uploading from the local computer.
The variable '$user_avatar_upload' contains either the remote URL or the
temporary server name depending on whether the source of the avatar to
upload is local or remote. In the event that both a local and remote
upload are requested simultaneously, the temporary upload location is
substituted with the remote server name. This will later be copied to
the new location. By submitting a local path rather then a URL, an
attacker is able to execute an arbitrary copy() command.

An attacker can exploit this input validation condition by selecting an
avatar from the local machine that meets the board guidelines and can
then fill the "Upload Avatar from a URL:" field with the path to an
arbitrary file (ex: /etc/passwd). When the avatar is submitted, the
destination image of the submitted avatar will contain the contents of
the requested file.

III. ANALYSIS

Exploitation of this vulnerability allows remote attackers to view
arbitrary system files under the privileges of the underlying web
server. An attacker must have, or be able to create an account on the
target system. Non-default settings must also be enabled for
exploitation to be possible. Upon successful exploitation an attacker
may be able to further compromise the system by gleaning system
information that would otherwise be inaccessible to the attacker.

IV. DETECTION

iDEFENSE has confirmed the existence of this vulnerability in phpBB2
version 2.0.11. It is suspected that earlier versions are affected as
well. "Enable remote avatars" and "Enable avatar uploading" must be
enabled for the target to be vulnerable.

V. WORKAROUND

Disable remote avatars and remove avatar uploading. This can be done
through th phpBB administrative interface under "General Admin ->
Configuration -> Avatar Settings". Alternatively, enable the
'open_basedir' PHP security directive to lock file I/O operations to a
specific directory.

VI. VENDOR RESPONSE

This vulnerability is addressed in phpBB version 2.0.12 available for
download at:

   http://www.phpbb.com/downloads.php

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the
names CAN-2005-0259 to these issues. This is a candidate for inclusion
in the CVE list (http://cve.mitre.org), which standardizes names for
security problems.

VIII. DISCLOSURE TIMELINE

02/09/2005      Initial vendor notification
02/11/2005      Initial vendor response
02/22/2005      Public disclosure

IX. CREDIT

AnthraX101 (AnthraX101[at]gmail.com) is credited with this discovery.

Get paid for vulnerability research
http://www.idefense.com/poi/teams/vcp.jsp

Free tools, research and upcoming events
http://labs.idefense.com

X. LEGAL NOTICES

Copyright (c) 2005 iDEFENSE, Inc.

Permission is granted for the redistribution of this alert
electronically. It may not be edited in any way without the express
written consent of iDEFENSE. If you wish to reprint the whole or any
part of this alert in any other medium other than electronically, please
email customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate
at the time of publishing based on currently available information. Use
of the information constitutes acceptance for use in an AS IS condition.

There are no warranties with regard to this information. Neither the
author nor the publisher accepts any liability for any direct, indirect,
or consequential loss or damage arising from use of, or reliance on,
this information.
    

- 漏洞信息

14040
phpBB Avatar Upload Arbitrary File Access
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality
Exploit Public Vendor Verified

- 漏洞描述

phpBB contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a local avatar file is specified for upload along with an arbitrary file local to the web server, which will disclose the specified file on the web server resulting in a loss of confidentiality.

- 时间线

2005-02-21 2005-02-09
2005-02-21 2005-02-21

- 解决方案

Upgrade to version 2.0.12 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

PHPBB Arbitrary File Disclosure Vulnerability
Input Validation Error 12621
Yes No
2005-02-22 12:00:00 2009-07-12 10:56:00
Discovery is credited to AnthraX101 <AnthraX101@gmail.com>.

- 受影响的程序版本

phpBB Group phpBB 2.0.11
phpBB Group phpBB 2.0.10
phpBB Group phpBB 2.0.9
phpBB Group phpBB 2.0.8 a
phpBB Group phpBB 2.0.8
phpBB Group phpBB 2.0.7 a
phpBB Group phpBB 2.0.7
phpBB Group phpBB 2.0.6 d
phpBB Group phpBB 2.0.6 c
phpBB Group phpBB 2.0.6
phpBB Group phpBB 2.0.5
phpBB Group phpBB 2.0.4
phpBB Group phpBB 2.0.3
phpBB Group phpBB 2.0.2
phpBB Group phpBB 2.0.1
phpBB Group phpBB 2.0 .0
phpBB Group phpBB 2.0 RC4
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.9
phpBB Group phpBB 2.0 RC3
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.9
phpBB Group phpBB 2.0 RC2
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.9
phpBB Group phpBB 2.0 RC1
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.9
phpBB Group phpBB 2.0 Beta 1
- Apache Software Foundation Apache 1.3.9
- Apache Software Foundation Apache 1.3.9
Gentoo Linux
phpBB Group phpBB 2.0.12

- 不受影响的程序版本

phpBB Group phpBB 2.0.12

- 漏洞讨论

phpBB is affected by an arbitrary file disclosure vulnerability. This issue arises due to an input validation error allowing an attacker to disclose files in the context of a Web server running the application.

This may allow the attacker to gain access to sensitive data that may be used to carry out further attacks against a vulnerable computer.

A successful attack requires the attacker to have a user account and the presence of some non-default settings allowing for the uploading of remote avatars.

phpBB 2.0.11 and prior versions are affected by this issue.

- 漏洞利用

An exploit is not required.

- 解决方案

The vendor has released phpBB 2.0.12 to address this issue.

Gentoo has released advisory GLSA 200503-02 to address various issues in phpBB. Please see the referenced advisory for more information. Gentoo users may carry out the following commands to update their computers:

emerge --sync
emerge --ask --oneshot --verbose ">=www-apps/phpBB-2.0.13"


phpBB Group phpBB 2.0 RC1

phpBB Group phpBB 2.0 RC3

phpBB Group phpBB 2.0 RC4

phpBB Group phpBB 2.0 Beta 1

phpBB Group phpBB 2.0 RC2

phpBB Group phpBB 2.0 .0

phpBB Group phpBB 2.0.1

phpBB Group phpBB 2.0.10

phpBB Group phpBB 2.0.11

phpBB Group phpBB 2.0.2

phpBB Group phpBB 2.0.3

phpBB Group phpBB 2.0.4

phpBB Group phpBB 2.0.5

phpBB Group phpBB 2.0.6

phpBB Group phpBB 2.0.6 c

phpBB Group phpBB 2.0.6 d

phpBB Group phpBB 2.0.7

phpBB Group phpBB 2.0.7 a

phpBB Group phpBB 2.0.8 a

phpBB Group phpBB 2.0.8

phpBB Group phpBB 2.0.9

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站