Skunkware view-source远程目录遍历访问任意文件漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1105288 漏洞类型 未知
发布时间 1997-04-16 更新时间 2005-05-02
CVE编号 CVE-1999-0174 CNNVD-ID CNNVD-199702-002
漏洞平台 SCO CVSS评分 6.4
|漏洞来源
https://www.exploit-db.com/exploits/20568
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-199702-002
|漏洞详情
Skunkware2.0系统是由SantaCruz开发维护的一个Unix系统变种,view-source是其httpd部分中的一个脚本。view-source脚本实现上存在一个输入验证漏洞,远程攻击者可能利用此漏洞遍历服务器目录。view-source脚本对用户输入未做充过滤,远程攻击者可以在提供给脚本的参数中插入一系列"../"来遍历服务目录,访问读取任意Web进程有权限读取的文件,造成信息泄露。攻击者可以利用此漏洞收集到系统相关的很多有价值信息,可能有助于其进一步攻击。
|漏洞EXP
source: http://www.securityfocus.com/bid/2251/info

view-source is a script included with the httpd package bundled with Skunkware 2.0. Skunkware 2.0 is a variant of the UNIX Operating System distributed by Santa Cruz Operations.

A problem with the view-source script could allow access to restricted files remotely. The problem occurs in the handling of slashes and dots when appended to the view-source script. By appending a series of double-dots and slashes to a query using the view-source script, it is possible to traverse the directory structure on a web server. By doing so, it is possible for to view the contents of directories, and files that are readable by the UID of the httpd process. This flaw makes it possible for a user with malicious motives to read files on a remote system and gather intelligence for an attack against the system, as well as other potentially sensitive information. 

http://vulnerable.server/cgi-bin/view-source?../../../../../../../etc/passwd
|参考资料
VulnerablesoftwareandversionsConfiguration1OR*cpe:/a:netscape:communicator:4.0*cpe:/a:netscape:communicator:4.05*cpe:/a:netscape:communicator:4.06*cpe:/a:netscape:communicator:4.07*cpe:/a:netscape:communicator:4.5*cpe:/a:netscape:communicator:4.51*cpe:/a:netscape:communicator:4.6*DenotesVulnerableSoftware*ChangesrelatedtovulnerabilityconfigurationsTechnicalDetailsVulnerabilityType(ViewAll)CVEStandardVulnerabilityEntry:http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0174