CVE-2006-2060
CVSS6.4
发布时间 :2006-04-26 16:06:00
修订时间 :2011-03-07 21:35:05
NMCO    

[原文]Directory traversal vulnerability in action_admin/paysubscriptions.php in Invision Power Board (IPB) 2.1.x and 2.0.x before 20060425 allows remote authenticated administrators to include and execute arbitrary local PHP files via a .. (dot dot) in the name parameter, preceded by enough backspace (%08) characters to erase the initial static portion of a filename.


[CNNVD]Invision Power Board action_admin/paysubscriptions.php 目录遍历漏洞(CNNVD-200604-500)

        20060425之前的Invision Power Board (IPB) 2.1.x和2.0.x版本中的action_admin/paysubscriptions.php中存在目录遍历漏洞。这使得远程攻击者可以借助于name参数中的..(两个点)包含并执行任意本地PHP文件,在..之前有足够多的空格字符(%08)以擦除文件名中的初始静态部分。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:invision_power_services:invision_power_board:2.0.x
cpe:/a:invision_power_services:invision_power_board:2.1.x

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2060
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2060
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200604-500
(官方数据源) CNNVD

- 其它链接及资源

http://forums.invisionpower.com/index.php?showtopic=213374
(PATCH)  CONFIRM  http://forums.invisionpower.com/index.php?showtopic=213374
http://www.vupen.com/english/advisories/2006/1534
(UNKNOWN)  VUPEN  ADV-2006-1534
http://www.securityfocus.com/archive/1/archive/1/431990/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060425 Invision Vulnerabilities, including remote code execution
http://xforce.iss.net/xforce/xfdb/26072
(UNKNOWN)  XF  invision-admin-file-include(26072)
http://www.securityfocus.com/archive/1/archive/1/439607/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060710 Re: RE: Invision Vulnerabilities, including remote code execution
http://www.securityfocus.com/archive/1/archive/1/432226/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060427 Re: Invision Vulnerabilities, including remote code execution
http://www.osvdb.org/25008
(UNKNOWN)  OSVDB  25008
http://securityreason.com/securityalert/796
(UNKNOWN)  SREASON  796
http://secunia.com/advisories/19830
(UNKNOWN)  SECUNIA  19830

- 漏洞信息

Invision Power Board action_admin/paysubscriptions.php 目录遍历漏洞
中危 路径遍历
2006-04-26 00:00:00 2006-04-27 00:00:00
远程  
        20060425之前的Invision Power Board (IPB) 2.1.x和2.0.x版本中的action_admin/paysubscriptions.php中存在目录遍历漏洞。这使得远程攻击者可以借助于name参数中的..(两个点)包含并执行任意本地PHP文件,在..之前有足够多的空格字符(%08)以擦除文件名中的初始静态部分。

- 公告与补丁

        

- 漏洞信息

25008
Invision Power Board action_admin/paysubscriptions.php name Variable Traversal Arbitrary PHP File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

Invision Power Board contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to action_admin/paysubscriptions.php not properly sanitizing user input supplied to the 'name' variable. This may allow an attacker to include a file from the local host that contains arbitrary commands which will be executed by the vulnerable script.

- 时间线

2006-04-25 Unknow
2006-04-25 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, the vendor has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站