SalesLogix eViewer远程拒绝服务攻击漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1105766 漏洞类型
发布时间 2000-03-31 更新时间 2005-05-02
CVE编号 CVE-2000-0278 CNNVD-ID CNNVD-200008-001
漏洞平台 Windows CVSS评分 5.0
|漏洞来源
https://www.exploit-db.com/exploits/19835
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200008-001
|漏洞详情
SalesLogixeViewer是SalesLogix2000软件包带的一个WebCGI程序。SalesLogix的CGI管理实现上存在漏洞,远程攻击者可能利用此漏洞非授权执行管理功能。
|漏洞EXP
source: http://www.securityfocus.com/bid/1089/info

SalesLogix eViewer is a web application integrated with the SalesLogix 2000 package.

eViewer will not perform authorization on administrative commands if they are requested directly in the URL. Therefore, the URL:

http: //target/scripts/slxweb.dll/admin?command=shutdown

will cause the slxweb.dll process to shutdown. Possibly other commands aside from 'shutdown' could be performed by a remote user as well. Although the slxweb.dll process will restart once a new query or session is issued, continually requesting the URL above will cause a denial of service.

Additional notes:
The program which issues administrative commands (slxweb.dll) is installed by default in the /scripts directory and cannot be relocated. In addition to this security concern, the package requires a user to change the default anonymous username (IUSR_{systemname}) in Microsoft IIS to 'slxwebuser' and grant it administrative privileges. 

http://target/scripts/slxweb.dll/admin?command=shutdown
|参考资料

来源:BID
名称:1089
链接:http://www.securityfocus.com/bid/1089
来源:BUGTRAQ
名称:20000331SalesLogixEviewerWebAppBug:URLrequestcrasheseviewerwebapplication
链接:http://archives.neohapsis.com/archives/bugtraq/current/0006.html
来源:NSFOCUS
名称:3883
链接:http://www.nsfocus.net/vulndb/3883