CVE-2006-2498
CVSS6.4
发布时间 :2006-05-19 23:02:00
修订时间 :2011-03-07 21:36:19
NMCO    

[原文]Invision Power Board (IPB) before 2.1.6 allows remote attackers to execute arbitrary PHP script via attack vectors involving (1) the post_icon variable in classes/post/class_post.php and (2) the df value in action_public/moderate.php.


[CNNVD]Invision Power Board 多个任意PHP代码执行漏洞(CNNVD-200605-354)

        Invision Power Board (IPB) 2.1.6之前版本可以使远程攻击者借助与(1) classes/post/class_post.php中的post_icon 变量和(2)action_public/moderate.php中的df值有关的攻击向量,执行任意PHP脚本。

- CVSS (基础分值)

CVSS分值: 6.4 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:invision_power_services:invision_power_board:2.1.6
cpe:/a:invision_power_services:invision_power_board:2.0.3
cpe:/a:invision_power_services:invision_power_board:2.1.1
cpe:/a:invision_power_services:invision_power_board:2.1.5
cpe:/a:invision_power_services:invision_power_board:2.1_beta3
cpe:/a:invision_power_services:invision_power_board:2.1_rc1
cpe:/a:invision_power_services:invision_power_board:2.1.0
cpe:/a:invision_power_services:invision_power_board:2.0.1
cpe:/a:invision_power_services:invision_power_board:2.1_beta5
cpe:/a:invision_power_services:invision_power_board:2.0.4
cpe:/a:invision_power_services:invision_power_board:2.0.0
cpe:/a:invision_power_services:invision_power_board:2.1
cpe:/a:invision_power_services:invision_power_board:2.1.2
cpe:/a:invision_power_services:invision_power_board:2.1_beta4
cpe:/a:invision_power_services:invision_power_board:2.1.4
cpe:/a:invision_power_services:invision_power_board:2.1.3
cpe:/a:invision_power_services:invision_power_board:2.1_beta2
cpe:/a:invision_power_services:invision_power_board:2.0.2
cpe:/a:invision_power_services:invision_power_board:2.1_alpha2

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2498
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-2498
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200605-354
(官方数据源) CNNVD

- 其它链接及资源

http://secunia.com/advisories/20158
(VENDOR_ADVISORY)  SECUNIA  20158
http://forums.invisionpower.com/index.php?showtopic=215527
(PATCH)  CONFIRM  http://forums.invisionpower.com/index.php?showtopic=215527
http://forums.invisionpower.com/index.php?act=Attach&type=post&id=10026
(PATCH)  MISC  http://forums.invisionpower.com/index.php?act=Attach&type=post&id=10026
http://www.vupen.com/english/advisories/2006/1859
(UNKNOWN)  VUPEN  ADV-2006-1859
http://xforce.iss.net/xforce/xfdb/26541
(UNKNOWN)  XF  invision-unspecified-code-execution(26541)
http://www.securityfocus.com/bid/18040
(UNKNOWN)  BID  18040
http://www.osvdb.org/25668
(UNKNOWN)  OSVDB  25668
http://www.osvdb.org/25667
(UNKNOWN)  OSVDB  25667
http://attrition.org/pipermail/vim/2006-May/000776.html
(UNKNOWN)  VIM  20060519 Partial details on Invision Power Board (IPB) PHP execution issue

- 漏洞信息

Invision Power Board 多个任意PHP代码执行漏洞
中危 输入验证
2006-05-19 00:00:00 2006-05-22 00:00:00
远程  
        Invision Power Board (IPB) 2.1.6之前版本可以使远程攻击者借助与(1) classes/post/class_post.php中的post_icon 变量和(2)action_public/moderate.php中的df值有关的攻击向量,执行任意PHP脚本。

- 公告与补丁

        暂无数据

- 漏洞信息

25667
Invision Power Board moderate.php Arbitrary Code Execution
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown Vendor Verified

- 漏洞描述

Invision Power Board contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not properly validate the 'df' variable in a "preg_replace()" call in the action_public/moderate.php script. This could allow a user to inject and execute arbitrary PHP code via the "e" pattern modifier, leading to a loss of integrity.

- 时间线

2006-05-17 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, vendor has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站