发布时间 :2006-04-15 19:02:00
修订时间 :2008-09-05 17:01:54

[原文]UPOINT @1 Event Publisher stores sensitive information under the web document root with insufifcient access control, which allows remote attackers to read private comments via a direct request to eventpublisher.txt.

[CNNVD]UPOINT Event Publisher 信息泄露漏洞 (CNNVD-200604-249)

        UPOINT @1 Event Publisher以不足的访问控制权限将敏感信息存储在web文件根目录下。这使得远程攻击者可以借助于对eventpublisher.txt的直接请求读取私有注释。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BID  17647

- 漏洞信息

UPOINT Event Publisher 信息泄露漏洞
中危 输入验证
2006-04-15 00:00:00 2006-04-17 00:00:00
        UPOINT @1 Event Publisher以不足的访问控制权限将敏感信息存储在web文件根目录下。这使得远程攻击者可以借助于对eventpublisher.txt的直接请求读取私有注释。

- 公告与补丁


- 漏洞信息

@1 Event Publisher eventpublisher.txt Direct Request Private Comment Disclosure
Remote / Network Access Input Manipulation
Loss of Integrity Workaround
Exploit Public RBS Confirmed

- 漏洞描述

@1 Event Publisher contains a flaw that may lead to an unauthorized information disclosure.  The issue is triggered when an attacker makes a direct request to the eventpublisher.txt file, which will disclose private comments resulting in a loss of confidentiality.

- 时间线

2006-03-29 2006-03-23
2006-03-29 Unknow

- 解决方案

Currently, there are no known upgrades or patches to correct this issue. It is possible to correct the flaw by implementing the following workaround: Customers can add in the "@1 Script Secure code" to help secure the code

- 相关参考

- 漏洞作者

- 漏洞信息

@1 Event Publisher Information Disclosure Vulnerability
Input Validation Error 17647
Yes No
2006-04-21 12:00:00 2006-04-21 10:11:00
Jericho is credited with the discovery of this vulnerability.

- 受影响的程序版本

Upoint @1 Event Publisher 2003.12.18

- 漏洞讨论

@1 Event Publisher is prone to an information-disclosure vulnerability. This issue is due to a failure to properly secure access to sensitive information.

An attacker can exploit this vulnerability to retrieve sensitive information from the vulnerable system, including private user comments.

Information gained by exploiting this issue may aid malicious users in further attacks.

- 漏洞利用

This vulnerability may be exploited with a web client.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

- 相关参考