CVE-2006-0015
CVSS6.8
发布时间 :2006-04-11 19:02:00
修订时间 :2011-03-07 21:29:10
NMCOS    

[原文]Cross-site scripting (XSS) vulnerability in _vti_bin/_vti_adm/fpadmdll.dll in Microsoft FrontPage Server Extensions 2002 and SharePoint Team Services allows remote attackers to inject arbitrary web script or HTML, then leverage the attack to execute arbitrary programs or create new accounts, via the (1) operation, (2) command, and (3) name parameters.


[CNNVD]Microsoft FrontPage Server Extensions跨站脚本漏洞(MS06-017)(CNNVD-200604-154)

        FrontPage Server Extensions为FrontPage服务扩展,与IIS一起使用可以方便的支持管理、创建以及浏览FrontPage扩展的网站。
        FrontPage Server Extensions对HTML页面的处理存在输入验证漏洞,远程攻击者可能在客户机器上执行任意脚本代码。
        FrontPage Server Extensions的fpadmdll.dll中的一些参数没有正确的过滤返回给用户的特定输入,导致跨站脚本问题,可能允许攻击者以当前会话权限以客户机的浏览器中执行恶意脚本代码,利用这个漏洞必须用户交互。
        fpadmdll.dll中有漏洞的参数是operation、command和name。这些参数没有经过正确的过滤便出现在了输出中,但可通过"-->"转义。

- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:microsoft:sharepoint_team_servicesMicrosoft Sharepoint Team Services
cpe:/a:microsoft:frontpage_server_extensions:2002Microsoft frontpage_server_extensions 2002

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:1748FPSE XSS Vulnerability
oval:gov.nist.fdcc.patch:def:371MS06-017: Vulnerability in Microsoft FrontPage Server Extensions Could Allow Cross-Site Scripting (917627)
oval:gov.nist.USGCB.patch:def:371MS06-017: Vulnerability in Microsoft FrontPage Server Extensions Could Allow Cross-Site Scripting (917627)
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0015
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-0015
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-154
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/17452
(PATCH)  BID  17452
http://www.microsoft.com/technet/security/Bulletin/MS06-017.mspx
(PATCH)  MS  MS06-017
http://www.argeniss.com/research/ARGENISS-ADV-040602.txt
(VENDOR_ADVISORY)  MISC  http://www.argeniss.com/research/ARGENISS-ADV-040602.txt
http://securitytracker.com/id?1015896
(PATCH)  SECTRACK  1015896
http://securitytracker.com/id?1015895
(PATCH)  SECTRACK  1015895
http://secunia.com/advisories/19623
(VENDOR_ADVISORY)  SECUNIA  19623
http://www.vupen.com/english/advisories/2006/1322
(UNKNOWN)  VUPEN  ADV-2006-1322
http://www.securityfocus.com/archive/1/archive/1/430803/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060412 Vulnerability in Microsoft FrontPage Server Extensions Could Allow Cross-Site Scripting
http://xforce.iss.net/xforce/xfdb/25537
(UNKNOWN)  XF  fpse-html-xss(25537)
http://securityreason.com/securityalert/704
(UNKNOWN)  SREASON  704

- 漏洞信息

Microsoft FrontPage Server Extensions跨站脚本漏洞(MS06-017)
中危 跨站脚本
2006-04-11 00:00:00 2006-04-19 00:00:00
远程  
        FrontPage Server Extensions为FrontPage服务扩展,与IIS一起使用可以方便的支持管理、创建以及浏览FrontPage扩展的网站。
        FrontPage Server Extensions对HTML页面的处理存在输入验证漏洞,远程攻击者可能在客户机器上执行任意脚本代码。
        FrontPage Server Extensions的fpadmdll.dll中的一些参数没有正确的过滤返回给用户的特定输入,导致跨站脚本问题,可能允许攻击者以当前会话权限以客户机的浏览器中执行恶意脚本代码,利用这个漏洞必须用户交互。
        fpadmdll.dll中有漏洞的参数是operation、command和name。这些参数没有经过正确的过滤便出现在了输出中,但可通过"-->"转义。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
        http://www.microsoft.com/technet/security/Bulletin/MS06-017.mspx?pf=true

- 漏洞信息

24518
Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-04-11 Unknow
2006-04-12 Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
Input Validation Error 17452
Yes No
2006-04-11 12:00:00 2006-04-13 06:07:00
Esteban Martínez Fayó is credited with the discovery of this vulnerability.

- 受影响的程序版本

Microsoft Windows XP Professional x64 Edition
Microsoft Windows XP Professional SP2
Microsoft Windows XP Professional
Microsoft Windows XP Home SP2
Microsoft Windows Server 2003 Standard x64 Edition
Microsoft Windows Server 2003 Standard Edition SP1
Microsoft Windows Server 2003 Enterprise x64 Edition
Microsoft Windows Server 2003 Enterprise Edition Itanium SP1
Microsoft Windows Server 2003 Enterprise Edition Itanium 0
Microsoft Windows Server 2003 Enterprise Edition SP1
Microsoft Windows Server 2003 Datacenter Edition Itanium SP1
Microsoft Windows Server 2003 Datacenter Edition Itanium 0
Microsoft SharePoint Team Services 2002
+ Microsoft Office XP SP1
Microsoft FrontPage Server Extensions 2002
Microsoft Windows SharePoint Services
Microsoft Windows ME
Microsoft Windows 98SE
Microsoft Windows 98
Microsoft FrontPage Server Extensions 2000
+ Microsoft Windows 2000 Advanced Server SP3
+ Microsoft Windows 2000 Advanced Server SP2
+ Microsoft Windows 2000 Advanced Server SP1
+ Microsoft Windows 2000 Advanced Server
+ Microsoft Windows 2000 Datacenter Server SP3
+ Microsoft Windows 2000 Datacenter Server SP2
+ Microsoft Windows 2000 Datacenter Server SP1
+ Microsoft Windows 2000 Datacenter Server
+ Microsoft Windows 2000 Professional SP3
+ Microsoft Windows 2000 Professional SP2
+ Microsoft Windows 2000 Professional SP1
+ Microsoft Windows 2000 Professional
+ Microsoft Windows 2000 Server SP3
+ Microsoft Windows 2000 Server SP2
+ Microsoft Windows 2000 Server SP1
+ Microsoft Windows 2000 Server
+ Microsoft Windows XP Home SP1
+ Microsoft Windows XP Home
+ Microsoft Windows XP Professional SP1
+ Microsoft Windows XP Professional
Microsoft FrontPage 2002
+ Microsoft Office XP
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional

- 不受影响的程序版本

Microsoft Windows SharePoint Services
Microsoft Windows ME
Microsoft Windows 98SE
Microsoft Windows 98
Microsoft FrontPage Server Extensions 2000
+ Microsoft Windows 2000 Advanced Server SP3
+ Microsoft Windows 2000 Advanced Server SP2
+ Microsoft Windows 2000 Advanced Server SP1
+ Microsoft Windows 2000 Advanced Server
+ Microsoft Windows 2000 Datacenter Server SP3
+ Microsoft Windows 2000 Datacenter Server SP2
+ Microsoft Windows 2000 Datacenter Server SP1
+ Microsoft Windows 2000 Datacenter Server
+ Microsoft Windows 2000 Professional SP3
+ Microsoft Windows 2000 Professional SP2
+ Microsoft Windows 2000 Professional SP1
+ Microsoft Windows 2000 Professional
+ Microsoft Windows 2000 Server SP3
+ Microsoft Windows 2000 Server SP2
+ Microsoft Windows 2000 Server SP1
+ Microsoft Windows 2000 Server
+ Microsoft Windows XP Home SP1
+ Microsoft Windows XP Home
+ Microsoft Windows XP Professional SP1
+ Microsoft Windows XP Professional
Microsoft FrontPage 2002
+ Microsoft Office XP
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 98
- Microsoft Windows 98SE
- Microsoft Windows NT Workstation 4.0 SP6a
- Microsoft Windows NT Workstation 4.0 SP6
- Microsoft Windows NT Workstation 4.0 SP5
- Microsoft Windows NT Workstation 4.0 SP4
- Microsoft Windows NT Workstation 4.0 SP3
- Microsoft Windows NT Workstation 4.0 SP2
- Microsoft Windows NT Workstation 4.0 SP1
- Microsoft Windows NT Workstation 4.0
- Microsoft Windows XP Home
- Microsoft Windows XP Professional

- 漏洞讨论

Microsoft FrontPage Server Extensions are prone to a cross-site scripting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before it is rendered to other users.

An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user, with the privileges of the victim userâ??s account. This may help the attacker steal cookie-based authentication credentials and launch other attacks.

- 漏洞利用

This issue can be exploited through a web client.

An example HTML form demonstrating this issue is availble:

<form action=http://www.example.com/_vti_bin/_vti_adm/fpadmdll.dll method="POST">
<input type="hidden" name="operation" value="--><script>alert()</script>">
<input type="hidden" name="action" value="none">
<input type="hidden" name="port" value="/LM/W3SVC/1:">
<input type="submit" name="page" value="healthrp.htm">
</form>

- 解决方案


The vendor has released fixes to address this issue; please see the reference section for further details.


Microsoft Windows Server 2003 Enterprise Edition SP1

Microsoft Windows Server 2003 Enterprise Edition Itanium SP1

Microsoft SharePoint Team Services 2002

Microsoft FrontPage Server Extensions 2002

Microsoft Windows Server 2003 Datacenter Edition Itanium SP1

Microsoft Windows XP Professional SP2

Microsoft Windows Server 2003 Standard x64 Edition

Microsoft Windows XP Professional x64 Edition

Microsoft Windows Server 2003 Enterprise x64 Edition

Microsoft Windows Server 2003 Enterprise Edition Itanium 0

Microsoft Windows XP Home SP2

Microsoft Windows Server 2003 Standard Edition SP1

Microsoft Windows Server 2003 Datacenter Edition Itanium 0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站