CVE-2006-3042
CVSS7.5
发布时间 :2006-06-15 06:02:00
修订时间 :2008-09-05 17:06:06
NMCO    

[原文]** DISPUTED ** Multiple PHP remote file inclusion vulnerabilities in ISPConfig 2.2.3 allow remote attackers to execute arbitrary PHP code via a URL in the (1) go_info[isp][classes_root] parameter in (a) server.inc.php, and the (2) go_info[server][classes_root] parameter in (b) app.inc.php, (c) login.php, and (d) trylogin.php. NOTE: this issue has been disputed by the vendor, who states that the original researcher "reviewed the installation tarball that is not identical with the resulting system after installtion. The file, where the $go_info array is declared ... is created by the installer."


[CNNVD]ISPConfig 多个远程文件包含漏洞(CNNVD-200606-321)

        ** 有争议 ** ISPConfig 2.2.3存在多个PHP远程文件包含路漏洞。远程攻击者可以借助 (a) server.inc.php中的(1) go_info[isp][classes_root]参数, 以及(b) app.inc.php, (c) login.php和(d) trylogin.php中的(2) go_info[server][classes_root]参数,执行任意PHP代码。注: 厂商对此提出反驳,声称原研究者"研究了与安装后产生的系统不同的安装 tarball。 宣称的 $go_info数组所在的文件...是由安装者创建的。"

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3042
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3042
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-321
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/18441
(UNKNOWN)  BID  18441
http://www.securityfocus.com/archive/1/archive/1/437415/100/100/threaded
(UNKNOWN)  BUGTRAQ  20060616 Re: [FSA016] ISPConfig 2.2.3, File inclusion vulnerability
http://www.securityfocus.com/archive/1/archive/1/437117/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060614 [FSA016] ISPConfig 2.2.3, File inclusion vulnerability
http://www.osvdb.org/27474
(UNKNOWN)  OSVDB  27474
http://securityreason.com/securityalert/1098
(UNKNOWN)  SREASON  1098

- 漏洞信息

ISPConfig 多个远程文件包含漏洞
高危 输入验证
2006-06-15 00:00:00 2006-06-28 00:00:00
远程  
        ** 有争议 ** ISPConfig 2.2.3存在多个PHP远程文件包含路漏洞。远程攻击者可以借助 (a) server.inc.php中的(1) go_info[isp][classes_root]参数, 以及(b) app.inc.php, (c) login.php和(d) trylogin.php中的(2) go_info[server][classes_root]参数,执行任意PHP代码。注: 厂商对此提出反驳,声称原研究者"研究了与安装后产生的系统不同的安装 tarball。 宣称的 $go_info数组所在的文件...是由安装者创建的。"

- 公告与补丁

        暂无数据

- 漏洞信息

27474
ISPConfig Multiple Script Remote File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

ISPConfig has been reported to contain a flaw that may allow a remote attacker to execute arbitrary commands. The issue is supposedly due to the server.inc.php, app.inc.php, login.php and trylogin.php scripts not properly sanitizing user input supplied to the 'go_info' variable. The vendor has disputed this disclosure stating the researcher reviewed "the installation tarball that is not identical with the resulting system after installtion. The file, where the $go_info array is declared that resulted in your errors is created by the installer. ISPCOnfig is not a web application that is run in a normal PHP capable webspace, ISPConfig comes with its own apache webserver and PHP specially compiled and configured for the needs of ISPConfig that prevents the attacks you described."

- 时间线

2006-06-14 Unknow
Unknow Unknow

- 解决方案

The vulnerability reported is incorrect. No solution required.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站